European countries and their quest for sovereignty !

The news which I will discuss later in this blog is very exciting. To be honest, this is news which I was expecting. This should have political impact all over Europe. But first some thoughts about Europe and why some countries sabotage European cooperation by choosing the JSF. European countries are all holding on to their sovereignty regarding European cooperation. For example the Common Foreign and Security Policy (CFSP)  isn’t working because each country has its own agenda, it’s own interests. This is a fact. and for us, the European people this is very hard, because our security and our welfare is at stake. I often use the phrase:

“But there is one single interest all European countries share… we live on the same continent which is under threat at the moment.”

threats to europe

This is the most important interest we, Europeans share… only with European countries. Not with the US, not with South Africa or Brazil, not with Australia or Indonesia. Our governments, including the Dutch Government, have two strange habits.. which strengthen each other.  first, they claim that European countries have their own agenda and interests.. so better cooperation isn’t an option. Then they (at least a lot of the European countries) chose for to prioritize NATO and thus the transatlantic connection. I am very in favor of good relations within NATO. I See European cooperation within the cadres of NATO… don’t get me wrong… But i see it as an equal partner. Not just being some little vassal state… like we are now.  The strange thing is, that these interests should be prioritized by European leaders. But they don’t. These same leaders are also in favour of the devastating TTIP and other big trade deals. Why? Are the interests of industrialists and their shareholders more important than the interests of the European peoples? Can we eat exponential growth? Can we drink debt? Can we fuel our cars on legal disputes? Why do some countries, like the Netherlands, choose to be a vassal state of the United States Government? I say specifically government because i believe in the American people and the land of the free. But I see the USG has changed all that. The things President Eisenhower was warning us for. (Here you can find the written speech of President Eisenhower.)

This is what President Eisenhower warned us about:

…we yet realize that America’s leadership and prestige depend, not merely upon our unmatched material progress, riches and military strength, but on how we use our power in the interests of world peace and human betterment.


Throughout America’s adventure in free government, our basic purposes have been to keep the peace; to foster progress in human achievement, and to enhance liberty, dignity and integrity among people and among nations. To strive for less would be unworthy of a free and religious people.

But here we are. Completely like a vassal state of the USG, just like the old days:

vassal state is any state that is subordinate to another. The vassal in these cases is the ruler, rather than the state itself. Being a vassal most commonly implies providing military assistance to the dominant state when requested to do so; it sometimes implies paying tribute, but a state which does so is better described as a tributary state. In simpler terms the vassal state would have to provide military power to the dominant state. Today, more common terms are puppet stateprotectorate or associated state.

We give assistance to wars of the USG, didn’t we? Yes we did some good things in Afghanistan, and also in Iraq. But was it really necessary? We had to support the USG, why? because they defend us from Russia? Otherwise we would have spoken Russian today? You think I’m kidding/ This is exactly what many “transatlantic” thinkers are saying to me.. when i ask them why? Shouldn’t we think ourselves where and when, and whom we would fight? What are our interests (except the always important economic interests… of the high society rulers?

Then I read the following article of Giovanni de Briganti @

The F-35 is entirely dependent on the ALIS system for its maintenance, and on US-based software laboratories for its mission data loads, so that its operation requires secure and high-speed Internet links between its operating bases and the US. 

It is written in the following article see the first paragraphs here:

                US Software Stranglehold Threatens F-35 Foreign Operations

The unilateral decision by the United States to locate all F-35 software laboratories on its territory, and to manage the operation and sustainment of the global F-35 fleet from its territory, has introduced vulnerabilities that are only beginning to emerge. 

The biggest risk is that, since the F-35 cannot operate effectively without permanent data exchanges with its software labs and logistic support computers in the United States, any disruption in the two-way flow of information would compromise its effectiveness.

All F-35 aircraft operating across the world will have to update their mission data files and their Autonomic Logistic Information System (ALIS) profiles before and after every sortie, to ensure that on-board systems are programmed with the latest available operational data and that ALIS is kept permanently informed of each aircraft’s technical status and maintenance requirements. ALIS can, and has, prevented aircraft taking off because of an incomplete data file.

Short summary article:

  • USG decided unilateral that all software laboratories should be on US territory, also Operation & Sustainment (O&S) also managed from US territory.
  • The JSF needs permanent data exchanges, before and after every sortie
  • ALIS can, and has, prevented aircraft taking off because of an incomplete data file.
  • the volume of data that must travel to and from the United States is gigantic, and any disruption in Internet traffic could cripple air forces as the F-35 cannot operate unless it is logged into, and cleared by, ALIS.
  • “undersea Internet cables are surprisingly vulnerable.”
  • “Russian submarines and spy ships are aggressively operating near the vital undersea cables that carry almost all global Internet communications, raising concerns among some American military and intelligence officials that the Russians might be planning to attack those lines in times of tension or conflict.”
  • “ultimate Russian hack on the United States could involve severing the fiber-optic cables at some of their hardest-to-access locations to halt the instant communications on which the West’s governments, economies and citizens have grown dependent,”
  • If the F-35 performs as advertised, it should gather very argue amounts of tactical data during each mission – data that it will have to transmit to the software labs in the US so they can be used to update the mission data files, adding another large volume data flow in both directions.
  • The OT&E report mentions that “Maintenance downloads using the ground data receptacle … usually takes an hour, delaying access to maintenance information.” This is an indication of the data volume involved, especially as the upgraded ALIS runs on a standard Windows 7 operating system.
  • “Currently, the pilot debrief timeline is too long as it takes approximately 1.5 hours to download a 1.5 hour flight. This is unacceptable and [we] are in the process of fielding an improved system [which] will decrease the timeline to download mission data by a factor of 8, meaning a 1.5 hour flight will be downloaded in about fifteen minutes,” he told the Subcommittee on Tactical Air and Land Forces of the House Armed Services Committee on Oct 21.


For some people this still isn’t clear what the implications are.

  • The USG will manage the entire global fleet, and we are bound to their rules. And we will be able to operate only when and where the USG wants us to operate.
  • What we read here should have impact on decision making in Europe within each JSF partner country.
  • The non-U.S. operator will not be able to use its own intelligence data to update the EW system, or the “fusion engine” used to identify targets, or modify the system to defeat cyber threats, without the active cooperation of U.S. personnel in the Reprogramming Labs.
  • Our Aircraft can fly…. but they can’t operate!

Do we really want to be tight (forced) to this way of operation? With this system every European country, like the Netherlands, which is claiming they want sovereignty concerning EU foreign policy for example are willing to give away full sovereignty over our Air Force… and as we don’t have much more than an Air Force we have no other means.

Taking so much risk with the internet use for ALIS and the reprogramming labs and enormous data flows is incredible because we all know that hackers can… and will attack such systems.

What amazes me is the enormous arrogance of the Transatlantic proponents. Why do they think they are superior. Taking so much risk with the internet use for ALIS and the reprogramming labs and enormous data flows is incredible because we all know that hackers can… and will attack such systems. as the Chinese already have done. A different aspect (and risk) of using a public network infrastructure we know as ‘the internet’ is known in information security communities as “CIA”: confidentiality, integrity & availability. As the widespread and frequent problems of ‘man-in-the-middle’ attacks and ‘distributed denial of service’ attacks demonstrate, there are some risks associated with using the internet, despite security measures such as vpn tunneling, encryption, etc.


Clearly the design of ALIS and it’s vulnerabilities is seriously flawed… How can they use so much money and resources and deliberately risk hacks, and thus risking availability of JSF fighters for users concerned. Some countries have several different fighter aircraft. Others, like the Netherlands can only operate one type. the JSF. More on this, read my article: How can Air Force guys (and girls) be so ignorant? they use the OODA Loop… don’t they?


Geef een reactie

Vul je gegevens in of klik op een icoon om in te loggen. logo

Je reageert onder je account. Log uit /  Bijwerken )

Google photo

Je reageert onder je Google account. Log uit /  Bijwerken )


Je reageert onder je Twitter account. Log uit /  Bijwerken )

Facebook foto

Je reageert onder je Facebook account. Log uit /  Bijwerken )

Verbinden met %s