logo
Very Close Encounter Between F-35 And Su-35 Caught On Cockpit Camera

Very Close Encounter Between F-35 And Su-35 Caught On Cockpit Camera

Yahoo04-04-2025

A video has emerged showing what looks to be a very close encounter between a Russian Su-35 Flanker-E and an Alaska-based U.S. Air Force F-35A Joint Strike Fighter. A variant of the Russian Tu-95 Bear bomber is also seen in the footage.
The clip, seen in the social media post below, first appeared earlier today on the Fighterbomber Telegram channel, which has ties to the Russian Aerospace Forces. The brief footage appears to show the F-35A encroaching on the Flanker, briefly ending up forward and right of it, very close to its nose, although it is hard to be certain. No additional context is provided, and it is unclear where or when exactly the video was shot.
#ColdWar2 The Russian fighter pilot has balls of steel. Well done! https://t.co/aYYA03GfmA pic.twitter.com/gj8mK3baZZ
— Capt(N) (@Capt_Navy) April 4, 2025
The last time the U.S.-Canadian North American Aerospace Defense Command (NORAD) publicly announced having detected and tracked Russian military aircraft off the coast of Alaska, which is not an uncommon occurrence, was back in February. NORAD subsequently released pictures showing Air Force F-35As flying alongside Russian Su-35s and Tu-95s in international airspace within the Alaska Air Defense Identification Zone (ADIZ). Neither U.S. nor Russian authorities appear to have made any mention at that time of unusually close and/or potentially unsafe maneuvering on either side. Such incidents between U.S. and Russian military aircraft, as well as American and Chinese ones, are hardly unheard of, including off Alaska.
TWZ has reached out to NORAD for more information.
— #WeHaveTheWatch —On Feb. 18 & 19, 2025, @NORADCommand F-35 Lightning II fighter aircraft positively identified and intercepted 2 Russian Tu-95 and 2 Su-35 military aircraft in the Alaska Air Defense Identification Zone (ADIZ) remaining in international airspace west of AK. pic.twitter.com/yamTxXz7fY
— Alaskan NORAD Region and Alaskan Command (@ANRALCOM) February 21, 2025
Regardless of the exact context of the encounter between the Flanker and the F-35A, there are inherent risks, including of a potential collision, when any two aircraft, let alone fast-moving combat jets, fly very close together.
As TWZ has noted on many occasions in the past, 'unprofessional' maneuvering between U.S. and Soviet aircraft was commonplace during the Cold War, and this continued with the Russians afterward. China's air arms have also become well-known for similar practices. At the same time, there has been something of an uptick in these kinds of 'close encounters' between American aircraft and their Russian and Chinese counterparts in recent years, both around the U.S. homeland and other locales abroad. These kinds of encounters can extend down into the maritime and ground domains, as well.
Just last month, videos also emerged showing a Russian Il-38 May maritime patrol plane buzzing the U.S. Navy's aircraft carrier USS Carl Vinson while closely bracketed by an F-35C and an F/A-18E/F Super Hornet. The Carl Vinson Carrier Strike group was taking part in an exercise with Japanese and South Korean Forces in the East Sea (Sea of Japan) at the time.
#Navy I decided it would be a good idea to combine these two videos into one tweet. It's not often that videos from opposite sides are shot at the same time.
Face to face.
pic.twitter.com/VZxAtf7RFF
— Capt(N) (@Capt_Navy) March 29, 2025
In the Pacific, including around Alaska, Russian and Chinese air and maritime forces are increasingly conducting routine operations together, as well. A pair of China's H-6 cruise missile carrier aircraft notably flew their first-ever sorties off Alaska's coast last year as part of one of these joint patrols.
Absent a major change in Washington's relationship with Moscow and Beijing, this kind of air and maritime activity, and the potential therein for close encounters between the parties involved, only looks set to continue.
Contact the author: joe@twz.com

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Ukraine's Security Service serves Russian rapper Timati with notice of suspicion
Ukraine's Security Service serves Russian rapper Timati with notice of suspicion

Yahoo

timean hour ago

  • Yahoo

Ukraine's Security Service serves Russian rapper Timati with notice of suspicion

The Security Service of Ukraine has gathered evidence and served Russian singer and propagandist Timur Yunusov (better known by his stage name Timati) with a notice of suspicion. Source: Security Service of Ukraine Quote: "According to the case file, Yunusov is a participant in Russian propaganda efforts, who was Putin's confidant during the presidential elections in 2012, 2018 and 2024, participated in his inauguration and in events celebrating his victory in the 'elections'. In addition, Timati supported Russian aggression, the annexation of Crimea and the violation of Ukraine's fundamental rights to independence, sovereignty and territorial integrity." Details: The Security Service of Ukraine also noted that Timati participated in at least seven propaganda concerts on the temporarily occupied peninsula, which were aimed at legitimising the occupation of Crimea. Based on evidence gathered by the investigators, he was served with a notice of suspicion under Article 332-1.2 of the Criminal Code (violation of the procedure for entering and leaving the temporarily occupied territory of Ukraine with the aim of harming state interests, committed repeatedly). The pre-trial investigation is being conducted under the procedural guidance of the Office of the Prosecutor General. Support Ukrainska Pravda on Patreon!

Israeli Commandos Attacked Iranian Air Defenses With Drones From Inside The Country: Report
Israeli Commandos Attacked Iranian Air Defenses With Drones From Inside The Country: Report

Yahoo

timean hour ago

  • Yahoo

Israeli Commandos Attacked Iranian Air Defenses With Drones From Inside The Country: Report

Israel's Operation Rising Lion, which aims to neuter Iran's nuclear and long-range weapons capabilities, began with an overnight attack on a wide array of targets. These strikes included the use of drones and missiles launched by operatives from deep within Iran. This is the conclusion of a report from Israeli outlet N12, which cites an unnamed Israeli security source. You can get up to speed with our initial reporting of Operation Rising Lion and its aftermath here. While details understandably remain thin, the implication is that Mossad meticulously prepared for the attack over many months, including placing agents in Iran. From there, they would operate one-way attack drones and loitering anti-armor missiles, as well as establish a covert drone base 'in the heart of Iran,' to neutralize Iranian air defenses and create other critical effects to kick off the long-awaited campaign. 'As part of their activities, Mossad agents implemented significant moves to introduce special weapons on a large scale, deploy them throughout Iran, and launch them towards the attack targets in a precise and effective manner,' the security source told N12. Cleared for publication: Mossad agents on Iranian soil used drones & high-precision missiles in ops to eliminate key Iranian officials, N12 News reports. Unbelievable. — Israel Radar (@IsraelRadar_com) June 13, 2025 Among the targets reportedly prosecuted by Israeli operatives within Iran was an air defense site near Tehran. Shortly before the operation began, Israeli drones launched from within Iran struck surface-to-air missile launchers there, clearing the way for the larger strike, which also involved Israeli Air Force (IAF) fighter jets. This would also explain the apparent inactivity by Iranian air defense sites during the Israeli bombardment. At the same time, the IAF has also been flying suppression and destruction of enemy air defenses (SEAD/DEAD) operations that the service says have destroyed 'dozens of radars and surface-to-air missile launchers.' בשעות האחרונות מטוסי קרב של חיל-האוויר, בהכוונה מודיעינית מדויקת של אגף המודיעין, השלימו תקיפה נרחבת נגד מערך ההגנה האווירית של המשטר האיראני במערב איראן.במסגרת התקיפות הושמדו עשרות מכ״מים ומשגרי טילי קרקע-אוויר. — Israeli Air Force (@IAFsite) June 13, 2025 According to Israeli officials, around 200 IAF aircraft were involved in the operation, dropping some 330 munitions. Although the IAF routinely uses standoff weaponry for strikes of this kind, removing Iranian ground-based air defenses would have provided a further element of protection as well as ensuring that munitions launched from IAF aircraft were able to make it through to their targets. Video and photos released by the IDF show Israeli Air Force F-16 and F-35 fighters launching to attack targets in Iran. The F-16s are seen carrying Small Diameter Bombs (SDB) and Popeye missile datalink pods: The IDF releases footage showing Israeli Air Force fighter jets heading out for the strikes in Iran this morning, as well as landing following the attacks. — Emanuel (Mannie) Fabian (@manniefabian) June 13, 2025 "עם כלביא": תיעודים מרגעי ההמראות והנחיתות של מטוסי הקרב של חיל-האוויר, במבצע לפגיעה בתוכנית הגרעין האיראנית — Israeli Air Force (@IAFsite) June 13, 2025 Meanwhile, other Israeli one-way attack drones launched from within Iran were reportedly sent against surface-to-surface missile launchers determined to pose a threat to Israeli strategic targets and Israeli citizens. It's unclear exactly how the Israeli drones and missiles were transported into Iran and how they were then concealed. According to N12, the Mossad cells established at least some drone and missile bases 'in the open, not far from Iran's air defense systems.' The video in the tweet embedded below purports to show drones and/or missiles launched by Mossad operatives who were infiltrated close to Tehran: תקיפת טילי ומשגרי הקרקע-קרקע האיראניים באמצעות רחפי נפץ שהוחדרו על ידי המוסד במרחב טהראן | תיעוד@roysharon11 — כאן חדשות (@kann_news) June 13, 2025 Video footage appears to show Israeli commandos on the ground in Iran and operating Rafael Spike precision-guided missiles. Spike, specifically the Non-Line-Of-Sight (NLOS) version, would be an ideal weapon for this sort of mission, since it can be launched from behind cover. It can be employed in a 'fire and forget' mode or using man-in-the-loop guidance. In this way, the missile can also be used to reconnoiter targets before striking them, with extreme precision, as well. Images of Mossad operatives in Iran conducting strikes overnight. Appear to possibly use Spike ATGMs to hit air defence assets. — ELINT News (@ELINTNews) June 13, 2025 In an operation that was years in the works, Mossad and the Israeli Defense Forces (IDF) drew up a target list of individuals associated with the Iranian nuclear program as well as key security officials. The preemptive strike eliminated various individuals, apparently targeting at least some of them in their own homes, as well as hitting elements of Iran's nuclear infrastructure and strategic missile systems. According to Iranian state media, the head of the Revolutionary Guards, Gen. Hossein Salami, the Army Chief of Staff, Maj. Gen. Mohammad Bagheri, and the commander of the Khatam al-Anbia Joint Forces Headquarters, Maj. Gen. Gholamali Rashid, were killed in the strikes, as well as six nuclear scientists, including Fereydoun Abbasi, the head of Iran's Atomic Energy Organization from 2011 to 2013. 'The institutional campaign was planned for a long time and required bold and sophisticated planning alongside groundbreaking thinking and strategizing,' the same intelligence source told N12. 'All operations required accurate research and intelligence gathering, advanced technologies, and the operation of extensive commando forces that operated in the heart of Tehran and throughout Iran in complete secrecy and under the watchful eyes of Iranian security and intelligence agencies.' When it comes to covert drone and missile operations, a recent precedent for this is seen in the work of Ukraine's intelligence services, which launched one-way attack drones from within Russian territory during Operation Spiderweb at the start of this month. On that occasion, drones concealed within trucks were launched in a coordinated attack on strategic bombers on different airfields deep within Russia, as you can read about here. The use of covertly launched drones to take out a strategic target in a long-planned and closely coordinated pre-emptive attack has significant parallels with what we are now seeing happen in Iran. Israel likely used similar tactics against Iran's air defense systems as Ukraine did against Russia's bombers. Near proximity precision attacks against critical targets using lower-end drones. The exact threat I have been detailing and warning of for over a decade. — Tyler Rogoway (@Aviation_Intel) June 13, 2025 There is also a suggestion that Israel may have employed vehicle-based weapons within Iran, with reports of undisclosed 'sophisticated technologies […] installed on vehicles' that targeted Iranian defense systems. BREAKING. This is downright insane. In the best sense of the word. Just wow. Seriously. This puts the beepers to shame. IDF Spokesperson: Two hundred planes dropped 330 munitions, the Chief of Staff, the head of the Revolutionary Guards and other senior officials were… — Hillel Fuld (@HilzFuld) June 13, 2025 Israel, too, appears to have also previously conducted covert kinetic attacks from within Iran. Israeli officials claimed that the assassination of Iran's top nuclear scientist Mohsen Fakhrizadeh, in 2020, involved using a gun in either a remote-controlled or entirely automated mount on a pickup truck, with no actual human assassins involved. The New York Times subsequently reported that Israeli intelligence 'used [an] AI-powered weapon built into an abandoned-looking vehicle' to target Fakhrizadeh. While a covert operation like that which appears to have been launched from within Iran during Operation Rising Lion has the advantage of surprise, it's not clear whether it can be repeated, at least in the short term. At the very least, Iranian authorities will now be very much on the alert to uncover any other similar bases or cells. With that in mind, Israel will likely resort to more traditional means for further kinetic attacks on Iran in the short term. On the other hand, Israel does still have different options for unconventional attacks, in particular other forms of sabotage, especially in the cyber domain. This is an area in which Israel essentially wrote the rulebook, notably in terms of the suppression of air defense systems. Israeli Prime Minister Benjamin Netanyahu has already declared that Rising Lion, which he says is aimed at 'rolling back the Iranian threat to Israel's very survival,' will take 'many days.' 'We struck at the heart of Iran's nuclear enrichment program,' Netanyahu said in a recorded televised address. 'We struck at the heart of Iran's nuclear weaponization program. We targeted Iran's main enrichment facility in Natanz. We targeted Iran's leading nuclear scientists working on the Iranian bomb. We also struck at the heart of Iran's ballistic missile program.' With Iran's supreme leader, Ali Khamenei, threatening 'severe punishment' against Israel, and Iran already having launched around 100 drones against Israel this morning, more strikes launched by both sides appear likely. Netanyahu has warned that the operation could be long and difficult, and that 'Israeli citizens may have to remain in sheltered areas for lengthy periods of time.' In the meantime, we may well start to learn more about how Israel launched an unprecedented attack from within Iran, as well. Contact the author: thomas@

Calls grow for Kristi Noem to resign in the wake of Padilla incident
Calls grow for Kristi Noem to resign in the wake of Padilla incident

Yahoo

timean hour ago

  • Yahoo

Calls grow for Kristi Noem to resign in the wake of Padilla incident

Homeland Security Secretary Kristi Noem is facing calls to resign after California Democratic Senator Alex Padilla was forcibly removed from her press conference in Los Angeles on Thursday and pinned to the floor. Noem was speaking in the California city after a week of unrest that has seen residents rise up to protest raids on undocumented migrants by Immigration and Customs Enforcement (ICE) agents, prompting President Donald Trump to send in 4,000 members of the National Guard and 700 Marines despite the objections of Gov. Gavin Newsom and L.A. Mayor Karen Bass. 'We are not going away,' Noem declared at the event. 'We are staying here to liberate the city from the socialists and the burdensome leadership that this governor and that this mayor have placed on this country and what they have tried to insert into the city.' At that point, Padilla entered and shouted: 'I'm Senator Alex Padilla. I have questions for the secretary. Because the fact of the matter is, a half dozen... Hands off!' He was duly swarmed by Secret Service and FBI agents and bundled out of the room. 'I came to the press conference to hear what she had to say, to see if I could learn any new additional information,' Padilla told reporters shortly after being released. 'I was there peacefully. At one point, I had a question and so I began to ask a question. I was almost immediately forcibly removed from the room.' The incident sparked uproar, with California Democratic Rep. Eric Swalwell calling for Noem's resignation. 'Kristi Noem should resign for what has happened under her watch,' Swalwell told NewsNation's Joe Khalil in an interview. 'No one asked for this. We were promised violent criminals would be deported. Instead, they deported a four-year-old American citizen battling cancer, they arrested a U.S. Marshal over the weekend, a U.S. citizen and now a U.S. senator, the second member of Congress in 45 days who's been arrested. 'No one asked for this. It's chaos, and her agents are running around, masked like 1800s bank robbers, you know, or the KGB officers in Russia. This is not what America looks like. So she should come to Congress. They should take the masks off, and they should stop terrorizing families.' Swalwell was incorrect to say that Padilla was arrested. As the senator clarified at his own press conference, he was handcuffed but not arrested or detained. White House Director of Communications Steven Cheung immediately retaliated against Swalwell on X with a disparaging nickname and an oblique reference to his alleged involvement with a suspected Chinese spy a decade ago. 'Eric Swallows is taking orders from Fang Fang and spewing lies because he's an absolute joke of a person who is unserious about his job,' Cheung wrote. 'These are the rantings of either a madman or a puppet.' White House Press Secretary Karoline Leavitt likewise accused Padilla of being 'childish', claiming he had 'crashed' the press conference and been 'recklessly lunging' at Noem when he was restrained. Senate Minority Leader Chuck Schumer saw it differently, saying the 'manhandling' of the senator had 'sickened my stomach' and declaring: 'We need immediate answers to what the hell went on.' Governor Newsom said Padilla's treatment was 'outrageous, dictatorial, and shameful' and added: 'Trump and his shock troops are out of control.' While their fellow Democrats Sylvia Garcia, Yassamin Ansari, and Madeleine Dean all told The Independent of their shock and disgust over the Padilla episode, the view on the other side of the aisle was, unsurprisingly, much closer to that of the West Wing. 'I think he should be charged. He should be prosecuted,' Georgia Republican Rep. Marjorie Taylor Greene said of Padilla in conversation with NewsNation. 'He came in very aggressively, and then he actually fought police. He actually resisted arrest and was aggressively refused to leave.' House Speaker Mike Johnson's response was equally predictable when he told reporters: 'The Democrat Party is on the wrong side. They're defending lawbreakers and now they're acting like lawbreakers themselves.'

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store