Software Faults Ground F-35 Warplanes

The Defense Department will stop accepting some newly built F-35 Joint Strike Fighters as delays in upgrading the fighter drag on.

Lockheed Martin has now said it would not be delivering around 53 F-35 fighter jets to the US military this year as it has problems authorising and checking the software that is preloaded on new jets.

The company now expects to deliver between 100 to 120 F-35s this calendar year, down from the planned 147 to 153, CEO Jim Taiclet has said.

Lockheed delivered 50 F-35s in the first six months of 2023, Taiclet said. Those planes all had software known as Technology Refresh 2.
 
Subsequent aircraft include new hardware and software, Technology Refresh 3, or TR-3, which will bring over 20 times more computing power, plus more memory and a new panoramic cockpit display.

But the company has been unable to get the new system working reliably, and in June, the Pentagon cancelled the jet delivery.

The Pentagon will not resume accepting the jets until they can reliably run at least the current TR-2 software, a spokesman for the F-35 joint program office said recently.

On the call, Taiclet attributed the reduced deliveries to “software maturation, acceptance and certification related to the…TR-3 configuration and hardware delivery timing.”

“Our team remains fully dedicated to delivering the first TR-3 aircraft in 2023,” he said.

Each plane Lockheed cannot deliver this year will reduce 2023 revenues by about $7 million, though that money will come through once the planes are delivered, CFO Jay Malave said on the earnings call.

In April, Lockheed executives predicted that software problems would shrink 2023 F-35s deliveries, but they did not say how many fewer would be delivered.

On Tuesday, Taiclet said the company still plans to deliver 156 aircraft in 2025 and into the future.

“The supply chain and production system continues to execute at a rate to support these future year delivery targets,” he said.

Getting deliveries back on track remains the focus for executives.

“We and our suppliers are applying all the needed resources to this. It's a top priority for our company and a few others as well,” Taiclet said. “We're running extra shifts. And we're deploying subject matter experts into other companies [at] our suppliers operations to make sure this stays on track.”

Despite delivering fewer planes, the company still continues to build planes even if it can’t deliver them.

“The whole production system, especially the long-lead-time parts, are tracking through the supply chain,” Taiclet said.

This will be the third time in less than a year that F-35 deliveries have been halted. In September 2022, the Pentagon announced that it had temporarily halted F-35 deliveries after the discovery of a Chinese-sourced alloy had for years been used to make a key magnet in the fighter. Those deliveries resumed in October 2022 after the Pentagon decided the Chinese material did not pose a danger to security or flight safety and issued a waiver.

International orders for the F-35 continue to rise, with Finland, Switzerland, Germany and Greece the latest overseas customers.

Defense One:     Defense News:     Politico:     The Week:     Spokesman

 

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible

« US Intel Leaders “It’s time to be Data Serious”
Trains Are A Cyber Security Risk »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

HANDD Business Solutions

HANDD Business Solutions

HANDD are independent specialists in data protection with expertise at every stage of the Protect, Detect and Respond cycle, from consultancy and design, right through to installation.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

sic[!]sec

sic[!]sec

sic[!]sec provide products and services for web application security.

Bluink

Bluink

Bluink specializes in identity and access management and customer identity verification, using your smartphone as a strong authenticator and secure identity store.

ACET Solutions

ACET Solutions

ACET Solutions delivers a wide range of Automation, Cyber Security and Enterprise IT/OT Integration Solutions to industrial clients.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

Enginsight

Enginsight

Enginsight provides a comprehensive solution for monitoring and securing your servers and clients.

Drawbridge

Drawbridge

Drawbridge is a premier provider of cybersecurity software and solutions to the alternative investment industry.

Dutch Institute for Vulnerability Disclosure (DIVD)

Dutch Institute for Vulnerability Disclosure (DIVD)

DIVD's aim is to make the digital world safer by reporting vulnerabilities we find in digital systems to the people who can fix them.

Devolutions

Devolutions

Devolutions make best-in-class Privileged Access Management, Password Management, and Remote Connection Management solutions available to ALL organizations — including SMBs.

Prancer

Prancer

Prancer is the industry's first cloud-native, self-service SAAS platform for automated security validation and penetration testing in the cloud.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

Prime Technology Services

Prime Technology Services

Prime Tech are a group of Red Hat, Microsoft & Cisco Certified IT Professionals with an impressive track record of consistently delivering value to our corporate clients.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

Oort

Oort

Oort is an identity threat detection and response platform for enterprise security. The Oort platform is API-driven, cloud-native and agentless for rapid time to value and high scalability.

Vercara

Vercara

Vercara offers a purpose-built, global cloud security platform that provides layers of protection to safeguard businesses’ online presence, no matter where an attack comes from or where it is aimed.