Feeds

Raptor over Blighty: Watch the stealth fighter in infrared

Tail-balancing 'thermos' jet outclasses Eurofighter

High performance access to file storage

Also at Farnborough - 1980s tech at Raptor prices - Italy cuts Eurofighter order

Eurofighter and BBMF Spitfire. Credit: Karl Drage

One of these is a truly great British-made fighter plane

Also at the show is the Eurofighter Typhoon, set to cost the British taxpayer somewhere from £20bn to £25bn once modernisation and upgrading for use as a bomber as well as a fighter are complete. The Typhoon currently lacks an electronically scanned radar as sported by the Raptor, for instance. The RAF is likely to receive 160 planes for this, though many will be mothballed as the service does not require and cannot man up nearly so many Typhoons.

The likely useable UK fleet of say 120-30 jets (including some spares to allow for crashes etc; quite possibly fewer than this will be required following the current cuts/review process underway at the MoD) will thus have cost Uk taxpayers £200m apiece or more, well north of $300m at current rates.

That's in the same price range as a Raptor (just 185 Raptors are to be made, which has pushed their unit price up). But the Eurofighter has no stealth, no thrust vectoring, not even a proper radar yet.

It costs like a Raptor, despite the fact that it is being made in much larger numbers, yet by comparison it is obsolete. The cost overruns on the programme, in the opinion of UK Treasury lawyers anyway, have released the UK from its pledge to buy 232 Eurofighters and keep 90+ of them in storage doing nothing. Even BAE Systems now accepts that the remaining "Tranche 3B" UK purchase is not going to happen.

It's no surprise then that Italy's defence minister, speaking at Farnborough, has just slashed his country's order from 121 jets to 96. Evidently his advisors have perceived the same escape mechanism as the British are using.

It's gloomy news all round, in fact, for the assembled European arms makers here at Farnborough: and the Americans are facing similar austerity on their side of the pond, too. But with both sides' armed forces engaged in bloody ground warfare against an enemy without air forces in Afghanistan, and both sides' governments needing to pay for the huge economic rescue handouts of recent years, taxpayers at least will probably be staying cheerful. ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Russian deputy PM: 'We are coming to the Moon FOREVER'
Plans to annex Earth's satellite with permanent base by 2030
Solar-powered aircraft unveiled for round-the-world flight
It's going to be a slow and sleepy flight for the pilots
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
India's GPS alternative launches second satellite
Closed satnav system due to have all seven birds aloft by 2016
Curiosity finds not-very-Australian-shaped rock on Mars
File under 'messianic pastries' and move on, people
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.