When the Swiss Air Force conducts a patrol over the Alps, its pilots rely on data. That data—detailed mappings of terrain, threat libraries defining enemy radar signatures, and encrypted mission parameters—flows into their F-35s via Mission Data Files (MDFs). These files are not generated in Bern. They are created, validated, and distributed by the U.S. Department of Defense. Switzerland, a nation synonymous with political neutrality, has outsourced a core component of its sovereign defense capability to a foreign power. This is not an aberration; it is the architectural blueprint of the F-35 program. The aircraft is not merely a weapon system for sale. It is the physical endpoint of a U.S.-controlled techno-strategic ecosystem. For partner nations, procurement becomes an exercise not just in military modernization, but in strategic re-alignment, with sovereignty as the down payment.
The procurement of a major weapons platform has always carried political baggage. Yet the F-35 represents a quantum leap in embedded dependency. Its value proposition—unprecedented interoperability and access to a “kill web”—is inextricably bundled with a loss of national autonomy over maintenance, upgrades, and, ultimately, operational deployment. This creates a modern form of technological suzerainty, where allies trade strategic flexibility for perceived security. The Gripen, by stark contrast, was designed as a sovereign tool. Its value proposition includes option value—the retained right to independently adapt, modify, and deploy the system. In an era of shifting alliances and unpredictable threats, this retained autonomy may be the most valuable capability of all.
The Architecture of Dependence#
Dependency in the F-35 program is not a bug; it is a feature engineered for control, security, and profitability. It manifests in three locked layers. The first is software sovereignty. The aircraft’s brain—its over 8 million lines of code—is proprietary to Lockheed Martin and governed by U.S. International Traffic in Arms Regulations (ITAR). Partners cannot independently modify core software or certify their own threat libraries. This means a nation’s ability to respond to a new regional radar system is contingent on Washington’s prioritization and approval.
The second layer is the sustainment monopoly. The Autonomic Logistics Information System (ALIS), and its successor ODIN, form a global, closed-loop network for diagnostics, parts ordering, and maintenance scheduling. While sold as “predictive logistics,” it functions as a single-vendor aftermarket. Nations cannot competitively source spare parts or develop indigenous maintenance protocols. Readiness data flows to the contractor and the U.S. government, creating an information asymmetry that limits a partner’s own ability to manage its assets. The third layer is the upgrade path lock-in. Hardware and software updates are rolled out in synchronized “blocks” decided by the Joint Program Office. A partner nation cannot selectively adopt an upgrade that suits its needs and budget; it must accept the entire, costly package or risk being incompatible with the global fleet.
The Price of the Exit Door#
This dependency imposes real, though often hidden, economic costs. Economists frame strategic autonomy as a real option—the right, but not the obligation, to make a future strategic choice. The F-35 program systematically forecloses these options. The cost of exiting the ecosystem is prohibitively high, creating what is known as vendor lock-in. For a mid-tier air force with 60 aircraft, the sunk costs in specialized hangars, simulators, training pipelines, and integrated support infrastructure can exceed $4 billion. This exit barrier exists even if a better, cheaper, or more politically suitable alternative emerges a decade from now.
Furthermore, the program bundles foreign policy constraints into the hardware. Use of the aircraft in conflicts not endorsed by the U.S. could theoretically be constrained through software locks, spares embargoes, or data-denial. While such drastic measures may be unlikely among allies, their mere possibility alters the strategic calculus. Procurement induces doctrinal convergence, as tactics, training, and intelligence sharing become deeply intertwined with the U.S. military. This creates a path-dependent relationship that extends far beyond the life of the aircraft, subtly aligning a nation’s broader foreign policy with that of its supplier.
The Sovereign Alternative#
The Gripen program inverts this model. From its inception, Sweden demanded technology transfer and national control as non-negotiable terms, even for export customers like Brazil and South Africa. Brazil’s Gripen E/F program, for instance, includes local assembly and deep industrial participation, ensuring that knowledge and upgrade capacity remain in-country. The aircraft’s open architecture allows nations to integrate their own weapons, datalinks, and sensors. Its logistics are based on transparency and manual override, not opaque algorithmic control.
This preserves what military strategist Barry Posen calls the “sovereignty premium.” A nation retains the right to determine its own operational tempo, to develop tactics for its unique geography, and to upgrade at a pace matching its budget and threat evolution. During the Cold War, Sweden’s independent defense stance, backed by its indigenous aircraft industry, provided significant diplomatic leverage. In today’s multipolar world, this premium may be increasing in value. The Gripen model demonstrates that interoperability—achievable through standardized NATO datalinks on Swedish terms—does not require subordination. It is possible to be an ally without being a client state. The choice, therefore, is not simply between two jets. It is between two visions of alliance: a deeply integrated but hierarchical network, or a modular, cooperative one where sovereignty remains a distributed asset.


