Morning Overview

Netherlands hints it can hack an F-35 like unlocking an iPhone

The Netherlands has quietly entered a charged debate about whether European nations can maintain sovereign control over the American-built F-35 fighter jet, a weapon system that depends entirely on U.S.-managed software, spare parts, and maintenance pipelines. The suggestion that a European ally might develop the technical means to independently access or override F-35 systems echoes the logic of jailbreaking a locked smartphone, where the device’s owner seeks capabilities the manufacturer never intended to share. This tension between allied cooperation and technological dependence is now forcing a broader reckoning across NATO about who really controls the weapons Europe flies.

Europe’s Fighter Jet Runs on American Software

The F-35 Lightning II is not simply a piece of military hardware that a buyer nation can operate freely once delivered. Unlike older fighter jets, the F-35 relies on a continuous digital relationship with its maker and the U.S. government. Software updates, diagnostic data, mission planning tools, and logistics systems all flow through a centralized sustainment architecture originally built around the Autonomic Logistics Information System, a Lockheed Martin-managed network that connects every F-35 worldwide. Without regular access to this pipeline, an operator nation cannot maintain the aircraft’s combat readiness or even keep it safely airworthy for long.

This dependency structure means that the United States does not need a dramatic “kill switch” to ground an allied fleet. A slower, quieter form of control exists through the ordinary mechanisms of sustainment. If Washington chose to withhold spare parts, delay software patches, or restrict access to mission data, European F-35 operators would face degraded performance and eventually grounded jets. The Financial Times investigation into these dependency risks has been cited in Dutch discussions as evidence that the vulnerabilities are not hypothetical but baked into the program’s logistics model. Parliamentary questions in The Hague now treat the kill switch issue as a matter of national security, not a fringe concern for defense-tech specialists.

Why the iPhone Analogy Cuts Deep

Comparing the F-35 to a locked iPhone is more than a clever metaphor; it captures a structural reality about control. Apple designs its phones so that users operate within a tightly managed ecosystem of approved software and services, with the company retaining the power to push updates, revoke app access, or disable features from afar. Owners who want fuller control resort to jailbreaking, accepting legal and technical risks in exchange for autonomy. Dutch officials and analysts who invoke this analogy are effectively arguing that, despite paying for the jets, the Netherlands occupies the position of the iPhone user rather than the manufacturer when it comes to the F-35’s most critical functions.

The analogy cuts especially deep because the stakes are not consumer convenience but national defense. When Apple restricts an iPhone, the consequences are measured in lost functionality or blocked apps; when the United States controls F-35 sustainment, the consequences can be measured in a country’s ability to patrol its skies or contribute to NATO operations. This framing has fueled a broader sovereignty debate in the Netherlands: can a state credibly claim control over its security policy if its frontline aircraft depend on a foreign government’s continued goodwill for software, data, and parts? The mere suggestion that Dutch authorities might someday seek technical means to access or override aspects of F-35 systems, even if only for contingency planning, signals a willingness to question long-standing assumptions about allied dependence on American defense technology.

The Kill Switch Debate Enters Parliament

What began as a technical worry within procurement circles has now entered the heart of Dutch politics. Parliamentary debates, committee hearings, and written questions have started to use the language of a kill switch explicitly, probing whether the F-35’s digital backbone could be leveraged in a crisis to limit Dutch operational freedom. Lawmakers are pressing defense officials to clarify how quickly the fleet would be affected if software updates were slowed, data access curtailed, or spare parts deliveries throttled. The concern is not that Washington would casually flip such a switch, but that the capability exists as a form of latent leverage in any future dispute.

The Netherlands is a revealing test case because it is neither a marginal ally nor a habitual critic of U.S. policy. As a founding NATO member and early F-35 adopter, it has been deeply embedded in joint operations and intelligence sharing for decades. If such a close partner feels compelled to interrogate the terms of its dependence, other European F-35 operators are unlikely to remain passive. Italy, Norway, Denmark, Belgium, Finland, and Poland all rely on the same sustainment and software pipelines and face similar questions about whether their most advanced aircraft could be constrained by decisions made in Washington rather than in their own capitals. The Dutch debate thus functions as a bellwether for a wider shift in how European democracies think about the trade-off between access to cutting-edge U.S. weapons and the loss of technical sovereignty.

Friendly Hacking and Allied Espionage-Lite

The notion that an ally might seek ways to “hack” its own aircraft (developing tools to inspect, replicate, or circumvent proprietary software and data pathways) pushes alliance politics into unfamiliar territory. For decades, allied governments accepted that buying American systems meant accepting American black boxes (sealed avionics, encrypted mission systems, and restricted source code). The F-35 program, although framed as a multinational partnership, preserved this hierarchy by giving partner nations industrial workshare and limited technical insight while keeping the core software and data architecture under U.S. control. Now, the idea that a European state might quietly cultivate expertise to peek inside that black box challenges the unspoken rules of the arrangement.

From one angle, such efforts could be framed as “friendly hacking” or “espionage lite”: not directed at stealing secrets from an adversary, but at understanding and, if necessary, modifying a system already purchased and flown under a national flag. From another angle, they could be seen as a logical extension of sovereign responsibility. Defense ministries are tasked with ensuring that critical weapons remain usable under the worst political scenarios, including alliance strain or abrupt policy shifts in supplier states. If the only way to guarantee that resilience is to build independent access paths (whether through reverse engineering, parallel support infrastructure, or indigenous software tools), then the political taboo against probing allied systems may erode. The result would be a quieter but consequential redefinition of what technological trust inside NATO actually entails.

The risks of this trajectory are significant. Any unauthorized modification to F-35 software, data links, or diagnostic tools could introduce bugs, degrade performance, or create unforeseen vulnerabilities. Because the jet is designed to operate as part of a tightly integrated network (sharing sensor data, mission plans, and threat libraries across allied fleets), fragmentation of software baselines or the insertion of unvetted code could ripple across multinational operations. Much as a jailbroken smartphone is more exposed to malware and loses access to official support channels, a “jailbroken” fighter jet could face both cyber threats and the withdrawal of formal maintenance guarantees. European governments contemplating greater technical autonomy must therefore weigh the sovereignty benefits against the operational and security downsides of deviating from the standardized, U.S.-managed configuration.

What This Means for Transatlantic Defense

The Dutch signal, however tentative, points toward a structural tension that will only sharpen as European defense budgets rise and calls for strategic autonomy grow louder. The F-35 is set to form the backbone of NATO’s airpower for decades, with European fleets numbering in the hundreds. As more capitals depend on the same U.S.-centric software and logistics pipelines, the underlying question becomes harder to ignore: does Europe possess true operational control over its premier combat aircraft, or is that control shared, and ultimately constrained, by decisions made in Washington and by American contractors? The answer will shape not only procurement choices but also political debates about the credibility of Europe’s security guarantees independent of U.S. policy swings.

One possible outcome is a push for more balanced arrangements within future joint programs, with European states demanding deeper access to source code, data rights, and sustainment infrastructure as a condition of participation. Another is a renewed drive to develop indigenous platforms (whether next-generation fighters or supporting systems) designed from the outset to be fully sovereign in software as well as hardware. Yet even if Europe diversifies its arsenal, the F-35 will remain central to NATO operations for many years, anchoring shared planning, exercises, and deterrence. Managing the tension between the efficiencies of a common, U.S-led platform and the political imperative of national control will therefore be a defining challenge for transatlantic defense. The Netherlands, by bringing the kill switch and iPhone analogies into open parliamentary debate, has merely voiced a dilemma that many other allies are already weighing behind closed doors.

More from Morning Overview

*This article was researched with the help of AI, with human editors creating the final content.