Morning Overview

F-35 overwhelmed: Old F-16 tactics still wreck stealth in war games

During large-scale war games at Nellis Air Force Base, F-35A Lightning II jets have repeatedly faced a stubborn problem: older F-16 aggressor pilots, armed with electronic warfare pods and classic fighter tactics, can degrade the stealth advantage that the fifth-generation jet was built around. The tension between billion-dollar low-observable technology and time-tested countermeasures has forced the Air Force to rethink how it trains pilots and tests the F-35’s real combat readiness. As the Pentagon prepares for potential conflict in the Pacific, the gap between what stealth promises and what it delivers in contested airspace is drawing sharper scrutiny from auditors, lawmakers, and the pilots themselves.

Red Flag Exposed the F-35’s Training Limits

The F-35A made its combat exercise debut at Red Flag 17-1, the Air Force’s premier war game held at Nellis AFB. That exercise brought the jet into a simulated high-threat environment for the first time alongside legacy aircraft and allied forces. While the Air Force highlighted maintenance performance and sortie generation during the event, the exercise also revealed that integrating a stealth platform into complex, multi-role scenarios is not the same as dominating them. Maintenance challenges during Red Flag 17-1 signaled that operational readiness, not just radar signature, would define the F-35’s battlefield value.

The broader lesson from Red Flag and similar exercises is that stealth does not operate in a vacuum. The F-35 depends on mature mission systems, reliable software, and coordinated tactics to translate its low-observable profile into real kills. A Government Accountability Office audit, designated GAO-14-322, warned years before Red Flag 17-1 that software and testing delays could prevent the jet from delivering its promised combat capability. That audit noted realistic operational testing in a threat environment was expected to begin in 2015, yet the program’s mission-systems maturity remained a persistent concern. The gap between the F-35’s design potential and its fielded performance has never fully closed, and war games keep exposing the seam.

How Aggressor Pilots Exploit Stealth Gaps

At Nellis, a small cadre of aggressor pilots flying older F-16s has developed a surprisingly effective playbook against stealth aircraft. These pilots use portable jammers, electronic warfare pods, and rapidly reconfigured threat-emitter setups to change the electromagnetic picture that blue-force pilots see on their displays. The concept, sometimes called the “red tax” inside the Air Force, is a workaround born from a shortage of dedicated aggressor aircraft and pilots. With fewer red-air assets available, the aggressors compensate by making each sortie more electronically complex, forcing F-35 pilots to contend with threat replication that mimics what a real adversary might deploy.

The result is a training environment where stealth advantages erode quickly. Aggressor crews can shift the electronic order of battle between sorties or even mid-flight, denying F-35 pilots the stable sensor picture they rely on. This matters because the F-35’s kill chain depends on fusing data from multiple sensors into a single coherent display. When that picture gets jammed, spoofed, or cluttered by legacy electronic warfare techniques, the pilot loses the information edge that stealth is supposed to protect. The fact that aging F-16s equipped with bolt-on pods can create this effect is a pointed reminder that adversaries do not need fifth-generation jets to contest fifth-generation advantages.

Stealth Is Not an Absolute Shield

A common assumption in defense commentary is that stealth equals invisibility, but strategic analysis from within the Defense Department tells a different story. Research published by the National Defense University examines how low-observable aircraft actually fit into modern doctrine and emphasizes that they are only one piece of a broader operational system. The analysis makes clear that adversaries can erode stealth advantages through a combination of non-stealth counter-tactics, electronic warfare, and operational adaptation. Low-observable technology reduces detection range, but it does not eliminate detection entirely, and opponents who understand that distinction can build effective countermeasures without matching American technology dollar for dollar.

This institutional assessment aligns with what the Congressional Research Service has outlined in its F-35 program overview, which pairs discussion of stealth benefits with caveats about survivability in dense threat environments. The CRS report summarizes ongoing testing issues and program status while noting that drawing sweeping conclusions from individual exercises requires caution. Still, the pattern across multiple sources points in the same direction: stealth is a significant tactical advantage, but it is not a decisive one when adversaries combine mass, electronic attack, and adaptive tactics. The dominant assumption that the F-35 can simply outclass any threat by virtue of its radar cross-section deserves more skepticism than it typically receives in procurement debates.

Why Open-Air Training Falls Short

One reason war-game results keep surprising planners is that open-air exercises at ranges like Nellis cannot fully replicate the threat density a real adversary would present. There are limits on how many aircraft, surface-to-air systems, and emitters can safely operate in the same airspace, and range infrastructure can only simulate so many modern sensors at once. The Air Force has acknowledged this limitation directly by investing in the Joint Simulation Environment, a next-generation simulator designed to model dense, rapidly evolving threat scenarios that physical ranges cannot reproduce. According to Air & Space Forces Magazine, Nellis warfighters are expected to begin training on this F-35 simulator in 2025, allowing them to face virtual threats at scales that would be impossible to stage in Nevada skies.

The move toward more advanced simulation signals that the service recognizes a fundamental gap. If open-air exercises cannot stack enough threats to truly stress the F-35, pilots may be overconfident about how their aircraft will perform in a saturated battlespace. In a Joint Simulation Environment scenario, planners can layer multiple integrated air-defense systems, cyber disruptions, and coordinated electronic attacks while still capturing detailed performance data. That data, in turn, can inform updates to tactics, techniques, and procedures that are then tested again in live-fly events. The interplay between virtual and physical training is becoming essential for understanding where stealth helps, where it falls short, and how pilots can compensate when the jet’s sensors and datalinks are under sustained assault.

Rethinking Readiness for a Contested Future

For the Pentagon, the emerging lesson from Nellis and similar venues is less about indicting the F-35 and more about redefining what “ready” means in an era of contested air superiority. Readiness can no longer be measured simply by sortie rates or the number of aircraft that meet maintenance benchmarks; it must also capture how well pilots can fight when their most prized advantages (stealth and sensor fusion) are under deliberate attack. Exercises where F-16 aggressors use creative electronic warfare to disrupt fifth-generation jets provide a glimpse of this future. They suggest that training must emphasize mission planning, emissions control, and cooperative tactics among multiple platforms at least as much as it emphasizes the individual performance of a single stealth fighter.

That shift has implications for acquisition and doctrine alike. If older aircraft equipped with modern pods can meaningfully challenge stealth platforms in training, then investments in electronic warfare, networking, and counter-stealth sensors may yield disproportionate returns compared with pouring ever more resources into marginal reductions in radar cross-section. At the same time, the F-35’s ability to act as a sensor node and battle manager remains valuable, especially when paired with realistic simulations and aggressor tactics that push its systems to the edge of failure. The challenge for the Air Force is to ensure that the lessons emerging from war games, about the limits of stealth, the ingenuity of aggressor pilots, and the constraints of open-air ranges, are fully integrated into how it prepares for the kind of high-end conflict its most advanced fighter was built to face.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.