The Royal Air Force have deployed Typhoon jets, Sentinel and Rivet Joint intelligence gathering aircraft and Voyager tankers to Exercise Red Flag in the US.

In the words of the MoD, “Red Flag pits ‘Blue’ coalition forces against hostile ‘Red Force’ aggressors, mirroring real-life threats in air-to-air, air-to-ground, space and cyber warfare.”

Typhoons, from 6 Squadron, RAF Lossiemouth, are ‘operating in a swing-role capacity, fighting their way into hostile airspace, launching precision strikes on ground targets and fighting their way out again.’

Voyager is taking part while a Sentinel and Rivet Joint are gathering intelligence and other mission-critical information.

Defence Secretary Sir Michael Fallon said:

“The RAF is playing a major role alongside our greatest ally in the world’s leading aerial combat training exercise.

Britain’s pilots and aircrews will receive unparalleled training and an opportunity to sharpen the combat skills they are demonstrating every day in the fight against Daesh.

Training alongside our US partners and other nations shows how the UK is stepping up internationally, ensuring maximum interoperability with our allies, and in doing so helping keep Britain safer and more secure.”

Group Captain Graham Pemberton, RAF Detachment Commander for the exercise, said:

“Red Flag replicates truly challenging, high-end warfare – from realistic aerial combat to emerging cyber and space threats. It’s as close as we can get to the real thing.

Testing ourselves against highly capable enemy aggressors is hugely beneficial and improves and readies our personnel – from pilots to those in crucial support roles – for real-world operations.

It’s a privilege for us to work with our US Air Force and Royal Australian Air Force counterparts and to cement our relationships with them at an exercise of this scale.”

Wing Commander Billy Cooper of 6 Squadron said:

“We flew eight Typhoons here from RAF Lossiemouth to take part with our US and Australian counterparts. One of our UK day jobs is protecting sovereign airspace through Quick Reaction Alert, but in Nevada we’ve been air-to-air fighting and carrying out strike missions.

Red Flag’s threat replication is truly unique. We can simulate fighting our way into a target area through a high-threat environment, drop precision munitions on specific targets and then fight our way back out again.”

The exercise runs until early February.

George Allison
George has a degree in Cyber Security from Glasgow Caledonian University and has a keen interest in naval and cyber security matters and has appeared on national radio and television to discuss current events. George is on Twitter at @geoallison

2 COMMENTS

  1. Here’s the full roster participating (taken from another forum)

    B-1 EL 37BS 86-0097, 86-0108, 86-0118, 86-0129
    B-1 EL 34BS 85-0084
    EC-130H DM 73-1595
    EA-18G NL VAQ-132 540/166934, 541/166935, 542/166943
    EA-18G NL VAQ-134 531/168766, 532/168767, 533/168768, 534/168769
    EA-18G NL VAQ-138 512/168388
    E-8 GA 97-0201
    F-15 Florida 159FS 78-0489, 85-0128, 86-0143, 86-0148, 86-0149, 86-0152, 86-0162, 86-0177, 86-0179
    F-16 SW 77FS 90-0821, 90-0806, 91-0359, 91-0368, 91-0371, 91-0377, 93-0536, 93-0544, 94-0040, 94-0043, 94-0046, 00-0225, 01-7050, 01-7051, 01-7052
    F-16 WI 176FS 86-0302, 87-0262, 87-0278, 87-0280, 87-0288, 87-0289, 87-0348, 87-0349
    F-16 Vermont 86-0289, with WIs
    F-22 FF 04-4065, 04-4067, 05-4082?/149FS, 08-4159, 08-4164, 08-4168, 08-4170, 09-4171, 09-4175, 09-4180, 09-4181, 09-4184
    F-35A HL 34FS 13-5071/34FS, 13-5072/388FW, 13-5075, 13-5077, 13-5079, 13-5081, 13-5083, 14-5090, 14-5093, 14-094, 14-5098, 14-5100, 14-5102
    HH-60 55RQS 4x
    KC-135 Fairchild 63-8000
    KC-135 MacDill 62-3505, 62-3517
    KC-135 McConnell 63-7995
    RC-135 OF 64-14843
    C-130J RAAF A97-468
    E-7 RAAF A30-001
    C-130J RAF ZH873
    Typhoons RAF ZJ947/EB-L, ZK300/H, ZK306/ED, ZK311/N, ZK321/EG, ZK333, ZK337/FP, ZK343
    Voyager RAF ZZ335
    R-1 RAF ZJ692
    RC-135 RAF ZZ665

LEAVE A REPLY

Please enter your comment!
Please enter your name here