&w=3840&q=100)
Pak claim of downing Rafales during Op Sindoor incorrect: Dassault CEO
Acknowledging that he was not exactly aware about the alleged combat losses during Operation Sindoor — given that New Delhi has not communicated anything on the matter — Trappier said in a French-language interview: 'What we do know is that the claims made by the Pakistanis (three Rafales destroyed) are incorrect.' He added: 'We will see whether there were losses or not, and whether the war aims were achieved. When the truth comes out, some may well be surprised.'
Speaking last week to French magazine Challenges, ahead of the Paris Air Show, the Dassault Aviation CEO also asserted that combat aircraft are used to carry out a military mission, where success is defined by achieving objectives, not by having zero losses. 'During World War-II, no one claimed the Allies lost the war because they suffered troop losses.'
Trappier was responding to a question on whether the alleged loss of at least one Rafale during the aerial clash with Pakistan in early May indicated that the French-designed jet had reached its limits.
To a question on whether the Rafale remained among the best combat aircraft in the world, 20 years after entering service, Trappier said while it was complicated to claim any one aircraft was the best in absolute terms, he sincerely believed the Rafale was the best when it came to a single platform capable of conducting air-to-air missions, reconnaissance, air-to-ground strikes, nuclear missions, and carrier operations. In that context, he added that it was better than the American Lockheed Martin F-35 stealth jet and far superior to all Chinese aircraft in the market. However, he did acknowledge: 'It's obvious that in a one-on-one aerial engagement with an F-22 (US Air Force stealth air superiority fighter), it's going to be tough for the Rafale.'
The Dassault Aviation CEO stressed that the Rafale 'perfectly meets' the needs of both the French armed forces and the countries that purchased it.
On the sidelines of the Shangri-La Dialogue security forum in Singapore last month, Chief of Defence Staff (CDS) General Anil Chauhan had said India 'rectified' its tactics after the May 7 losses and gained an advantage over Pakistan during the four-day conflict. These were the CDS' first remarks to international media since India launched Operation Sindoor in retaliation of the April 22 Pahalgam terrorist attacks, which New Delhi said had cross-border linkages.
Responding to questions about the loss of Indian jets, the CDS told an international news agency that while losses had occurred, India had carried out strikes inside Pakistan with 'pinpoint accuracy, some even to a metre, to whatever was our selected mean point of impact'. General Chauhan added that India had achieved its objectives.
In an interview with another news agency, General Chauhan said that Pakistan's claim of shooting down six Indian fighter jets was 'absolutely incorrect', but did not elaborate on India's losses.
The CDS said that Indian forces rectified their tactics and returned on May 7, 8, and 10 in large numbers to strike air bases deep inside Pakistan, penetrating all its air defences with impunity and carrying out precision strikes. He added that the IAF 'flew all types of aircraft with all types of ordnance on the (May) 10th'.
In a briefing a day after the May 10 pause in Operation Sindoor, under an understanding reached between the militaries of India and Pakistan, Director General of Air Operations Air Marshal A K Bharti had said that all IAF pilots who took part in the operation were back home. He did not deny losses but underscored that the aim of the operation had been achieved.
Responding to a media query on the possible loss of IAF aircraft during the operation and subsequent military exchanges with Pakistan, Air Marshal Bharti said: 'We are in a combat scenario, and losses are a part of combat. The question you must ask us is, have we achieved our objective of decimating the terrorist camps? And the answer is a thumping yes. And the results are for the whole world to see.' He added: 'As for the details of how many numbers or which platform we lost, at this point in time, I would not like to comment on that because we are still in a combat situation. If I comment on anything, it will only be an advantage for the adversary.'
Earlier this month, it was announced that, in a first, the fuselage of the Rafale combat aircraft would be manufactured in India — for both domestic and global markets — after Dassault Aviation and Indian private sector aerospace and defence major Tata Advanced Systems Limited (TASL) announced a tieup to manufacture key structural sections of the Rafale at a production facility TASL would set up in Hyderabad, Telangana.
In April, in the country's largest ever fighter jet acquisition, India signed an intergovernmental agreement (IGA) worth around ₹64,000 crore with France to procure 26 Rafale-Marine combat aircraft to bolster the Indian Navy's firepower.
The IAF earlier acquired 36 Rafale jets under a ₹60,000 crore IGA with France signed in September 2016.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


News18
19 minutes ago
- News18
Indian Air Force Shares Unseen Footage Of Attack On Terror Camps During Op Sindoor
Last Updated: Stating that "IAF responded with precision, speed, resolve", the video showed aerial strikes by the Indian fighter jets on terror sites in Pakistan and PoK. Showcasing the success of Operation Sindoor, the Indian Air Force (IAF) on Sunday shared a video showing a glimpse of an attack on terror camps in Pakistan and Pakistan-occupied Kashmir (PoK). IAF posted a video of about 6 minutes on X showcasing its power and strength in safeguarding the country. The clip shows how India avenged the April 22 Pahalgam attack, in which 26 civilians lost their lives. Stating that 'IAF responded with precision, speed, resolve", the video showed aerial strikes by the Indian fighter jets on terror sites in Pakistan and PoK. It also featured clips and pictures that showed the 'decimated" terror camps. Indian Air Force -Touch the Sky with Glory #IndianAirForce #YearOfDefenceReforms @DefenceMinIndia @SpokespersonMoD @HQ_IDS_India @adgpi @IndiannavyMedia @indiannavy @CareerinIAF — Indian Air Force (@IAF_MCC) August 10, 2025 The video also showed fighter jets in action during the 1971 war with Pakistan. It also mentioned the Kargil war and Indian strikes in response to the Pulwama attack in 2019. 'When the skies grow dark and danger looms across land or sea, there's one force that rises. Vast, fearless and precise. The Indian Air Force." The Indian armed forces launched Operation Sindoor on May 7 after and struck multiple terror camps in Pakistan and PoK, killing over 100 terrorists. In response, to India's action, Pakistan then launched a massive missile and drone attack, which India intercepted. In retaliation, Indian forces struck airfields in Pakistan. Air Chief Marshal Amar Preet Singh last Saturday said the IAF shot down five Pakistani fighter jets and a large aircraft during Operation Sindoor. 'We have an indication of at least one AWC in that AWC hangar, and a few F-16s, which are under maintenance there. We have at least five fighters confirmed killed and one large aircraft, which could be either an aircraft or an AWC, which was taken at a distance of about 300 kilometres. This is actually the largest ever recorded surface-to-air kill that we can talk about," he said during an event in Bengaluru. view comments First Published: August 11, 2025, 13:09 IST Disclaimer: Comments reflect users' views, not News18's. Please keep discussions respectful and constructive. Abusive, defamatory, or illegal comments will be removed. News18 may disable any comment at its discretion. By posting, you agree to our Terms of Use and Privacy Policy.


Indian Express
35 minutes ago
- Indian Express
India's cyber doctrine has an ambitious vision, but there are implementation challenges
On August 7 this year, the Chief of Defence Staff of India, General Anil Chauhan, released the Joint Doctrine for Cyberspace Operations. The unveiling of this declassified document represents India's formal acknowledgement that future warfare will be as much about bytes as bullets. While the doctrine articulates laudable strategic ambitions, its success will ultimately depend on addressing several practical challenges that need to be discussed, explored and harmonised. The doctrine's core premise — that cyber threats transcend traditional service boundaries — reflects hard-learned lessons from global conflicts. The 2007 cyber attacks on Estonia, which paralysed the nation's digital infrastructure, demonstrated how adversaries could achieve strategic objectives without firing a single shot. Similarly, the 2010 Stuxnet attack on Iran's nuclear facilities showed how cyber operations could achieve kinetic effects, blurring the lines between digital and physical warfare. India's own experience reinforces this reality. The 2020 Mumbai power grid attack, allegedly linked to Chinese hackers, illustrated how critical infrastructure vulnerabilities could be exploited during military tensions. Not to miss the recent info war using digital media and cyber attacks during Operation Sindoor. The doctrine's emphasis on 'threat-informed planning and real-time intelligence integration' acknowledges cyber warfare's unique characteristics. Unlike conventional military operations that follow established patterns, cyber attacks can emerge from state actors, criminal networks, or lone hackers with equal destructive potential. The 2017 WannaCry ransomware attack, which affected over 300,000 computers globally within days, exemplifies how rapidly cyber threats can escalate beyond traditional containment strategies. However, the doctrine's most ambitious goal — achieving true jointness in cyberspace — faces significant structural obstacles. The Indian military's historical tendency toward service-specific cultures runs deep. Each service has developed distinct procurement systems, operational protocols, and technological preferences over decades. The Army's focus on tactical cyber capabilities, the Navy's emphasis on maritime domain awareness, and the Air Force's space-cyber integration represent fundamentally different approaches to the same domain. Consider the ongoing challenges with India's Defence Cyber Agency, established in 2019. Despite its mandate to coordinate tri-service cyber operations, reports suggest that resource allocation, operational authority, and intelligence sharing still remain non-optimal. The doctrine's success will require overcoming these institutional barriers that have proven resistant to reform efforts. The US offers a cautionary tale. Despite establishing Cyber Command in 2009, American forces still struggle with inter-service coordination in cyberspace. The complexity of integrating Army network operations, Navy information warfare, and Air Force cyber capabilities has required constant organizational adjustments. If the world's most technologically advanced military faces such challenges, India's path toward cyber jointness will likely be even more complex. The doctrine's emphasis on human capital development reveals perhaps its most critical vulnerability. India faces a severe cybersecurity talent shortage, with industry estimates suggesting a deficit of over 10 lakh skilled professionals. The military's ability to compete with private sector salaries and work conditions for top cyber talent remains challenging but not impossible. This challenge is compounded by the specialised nature of military cyber operations. Unlike traditional military skills that can be developed through established training programs, cyber warfare requires continuous adaptation to evolving threats. The half-life of cybersecurity knowledge is measured in months, not years, requiring unprecedented investment in continuous learning and development. The doctrine's call for 'indigenous cyber capabilities' also raises practical concerns about India's technological ecosystem. While initiatives like the more than decade old National Cyber Security Strategy emphasize self-reliance, India's cybersecurity industry remains heavily dependent on foreign technologies and expertise. Building truly indigenous capabilities would require massive investments in research and development, with uncertain timelines for operational readiness. No doubt many start-ups have come up but they are mostly acquired by deep pocket foreign IT giants. The doctrine's analysis of international approaches, while informative, may oversimplify complex realities. China's cyber doctrine, for instance, isn't just about 'comprehensive national power' — it reflects a fundamentally different relationship between state and society. China's ability to mobilise private sector cyber capabilities through national intelligence laws has no equivalent in India's democratic framework. Similarly, the Russian model of leveraging 'non-state actors' for strategic objectives operates within a governance structure that tolerates criminal cyber activities when they serve state interests. India's approach to cyber deterrence must account for these fundamental differences in political systems and strategic cultures. The US model of 'persistent engagement' has also faced criticism for its potential to escalate conflicts and blur attribution lines. India's adoption of similar approaches could complicate its relationships with neighbors and create new vulnerabilities in an already complex regional security environment. Despite these challenges, the doctrine represents necessary progress in India's cyber evolution. Its public release serves important strategic communication purposes, signaling serious intent while maintaining operational ambiguity. However, several critical gaps require urgent attention. First, the doctrine lacks specific timelines and resource commitments for implementation. Without concrete benchmarks, it risks becoming another aspirational document rather than an operational blueprint. Second, the integration of civilian cybersecurity infrastructure with military operations remains underexplored. Given that most of India's critical infrastructure operates in the private sector, effective cyber defence requires unprecedented civil-military cooperation. Finally, the doctrine's deterrence strategy needs clearer articulation. Unlike nuclear deterrence, cyber deterrence operates in a domain where attribution is often uncertain and escalation dynamics are poorly understood. Translating doctrinal ambitions into operational capabilities, therefore, will require sustained political commitment, significant resource allocation, and institutional reforms that extend far beyond military structures. The writer, a defence and cyber security analyst, is former country head of General Dynamics


The Hindu
35 minutes ago
- The Hindu
Who was Anas al-Sharif, the Al Jazeera journalist killed in Israeli strike in Gaza?
Anas al-Sharif, a journalist for Al Jazeera, was killed in an Israeli strike on Sunday (August 10, 2025). While the Israeli military admitted in a statement to targeting Anas al-Sharif by labelling him as a 'terrorist' affiliated with Hamas, many rights advocates said he had been targeted for his frontline reporting on the Gaza war. Anas al-Sharif, 28, died after a tent for journalists outside the main gate of al-Shifa Hospital in Gaza City was struck. Also read | Israel-Gaza war LIVE Al Jazeera said its correspondent, Mohammed Qreiqeh, cameraman Ibrahim Zaher, and Moamen Aliwa, and their assistant Mohammed Noufal, were also killed in the attack. Who was Anas Al Sharif? Anas al-Sharif, an Arabic-language correspondent, had reported extensively from northern Gaza throughout the current Israel-Palestine conflict. His death is among more than 200 journalists reported killed since the war began. The reporter leaves behind his wife, Bayan, son, Salah, and daughter, Sham. A press freedom group and a U.N. expert previously warned that al-Sharif's life was in danger due to his reporting from Gaza. Al Jazeera said al-Sharif had left a social media message to be posted in the event of his death that read, '...I never hesitated to convey the truth as it is, without distortion or misrepresentation, hoping that God would witness those who remained silent.' Al-Sharif, whose X account showed more than 500,000 followers, posted on the platform minutes before his death that Israel had been intensely bombarding Gaza City for more than two hours. قصف لا يتوقف… منذ ساعتين والعدوان الإسرائيلي يشتد على مدينة غزة. — أنس الشريف Anas Al-Sharif (@AnasAlSharif0) August 10, 2025 Calling Al-Sharif 'one of Gaza's bravest journalists,' Al Jazeera said the attack 'is a desperate attempt to silence voices in anticipation of the occupation of Gaza.' 'Anas al-Sharif and his colleagues were among the last remaining voices in Gaza conveying the tragic reality to the world,' Al Jazeera said. This is my will and my final message. If these words reach you, know that Israel has succeeded in killing me and silencing my voice. First, peace be upon you and Allah's mercy and blessings. Allah knows I gave every effort and all my strength to be a support and a voice for my… — أنس الشريف Anas Al-Sharif (@AnasAlSharif0) August 10, 2025 Also read | Watch: How will the malnutrition crisis in Gaza affect a whole generation in Palestine? What did the IDF claim? Israel's military claimed responsibility for the assassination in a statement, alleging al-Sharif led a unit of Hamas's armed wing, a claim Al Jazeera described as false. 'STRUCK: Hamas terrorist Anas Al-Sharif, who posed as an Al Jazeera journalist Al-Sharif was the head of a Hamas terrorist cell and advanced rocket attacks on Israeli civilians and IDF troops. Intelligence and documents from Gaza, including rosters, terrorist training lists and salary records, prove he was a Hamas operative integrated into Al Jazeera. A press badge isn't a shield for terrorism,' the IDF said in a post on X. 🎯STRUCK: Hamas terrorist Anas Al-Sharif, who posed as an Al Jazeera journalist Al-Sharif was the head of a Hamas terrorist cell and advanced rocket attacks on Israeli civilians and IDF troops. Intelligence and documents from Gaza, including rosters, terrorist training lists and… — Israel Defense Forces (@IDF) August 10, 2025 (With inputs from Reuters and AFP)