The F-35 Lightning II is often called a “flying computer” for good reason—the stealth fighter’s most lethal capabilities come not from its airframe but from advanced AI-enabled sensor fusion, software upgrades, and cyber-hardened computing. Continuous software drops are now adding paradigm-changing weapons like the StormBreaker bomb, which can hit targets 40 nautical miles away through any weather conditions.
F-35 Flying Computer

A U.S. Air Force F-35A Lightning II takes off at RAF Lakenheath, England, Sept. 16, 2024. The 48th Fighter Wing dedicates allotted flying hours during hours of darkness to ensure Airmen are prepared to deter potential adversaries and defend NATO territory anytime, anywhere. (U.S. Air Force photo by Airman 1st Class Alexander Vasquez)
Upgrades to the F-35 continue to improve an impressive airframe.
Identifying a Chinese or Russian 5th-generation jet from safe stand-off ranges, ensuring a smooth and successful “glide slope” landing onto a carrier deck, merging otherwise disparate pools of information into a single organized, integrated picture for pilots, and quickly integrating new, paradigm-changing air-dropped weapons are all capabilities now fundamental to the operation of the F-35 Joint Strike Fighter.
These factors help explain why the F-35 is often referred to as a “flying computer,” alongside its more general reputation as a high-speed, stealthy, and maneuverable multi-role attack fighter.
Much, if not most, of the jet’s advanced performance is made possible by advanced computing, something easily overlooked or even eclipsed by the jet’s other, more visible and well-known attributes.
While many F-35 missions and operations, of course, directly pertain to a “kinetic” kill, attack, or combat engagement, they are all largely enabled by computer technology.
Sensor Fusion and AI
The jet’s well-known “sensor fusion,” which relies upon an advanced, AI-like ability to gather, distill, integrate, and present vast amounts of otherwise overwhelming data, is enabled by computing.
This means infrared and EO/IR sensor data, navigational and terrain specifics, weapons guidance technology and even EW information are all compiled, analyzed in relation to one another and presented to pilots in an integrated single picture. F-35 computing also enables its sensors to complete rapid threat identification and attack planning at safer, undetected stand-off ranges by bouncing incoming data off of its Mission Data Files database library cataloging known threats.

A U.S. Marine Corps plane captain assigned to the Marine Fighter Attach Squadron 225 (VMFA-225) signals to a pilot in a F35B Lightning II as it taxis on the flightline after landing in the U.S. Southern Command Area of Responsibility, Sept. 13, 2025. U.S. military forces are deployed to the Caribbean in support of the U.S. Southern Command mission, Department of War-directed operations, and the president’s priorities. (U.S. Air Force photo by Senior Airman Katelynn Jackson)
F-35 computing also brings the jet’s crucial “software drop” updates to fruition, an incremental upgrade process which continuously adds new weapons interfaces, improved sensing and high-speed AI-enabled information processing.
The “fourth” software drop, for example, integrates the paradigm-changing Stormbreaker bomb into the jet, introducing unprecedented attack ranges of up to 40 nautical miles, two-way course-correcting datalinks, and all-weather targeting technology.
Computing also plays a key role in precision targeting, as software upgrades can, in many cases, improve the performance of air-to-air and air-to-ground weapons.
This is particularly true for the F-35s AIM-120 and AIM-9X weapons, which have received flight-path and guidance technology enhancements through the integration of new software.
Much of this evolving process, or ongoing iteration of software upgrades to ensure continuous modernization, is made possible by common technical standards.
Often referred to as “open architecture,” the intent is to engineer a system with interoperable IP protocols so that new technologies can be quickly integrated without having to “re-construct” the aircraft’s computing infrastructure.
This kind of cyber-reliant modernization trajectory for the F-35, intended to ensure the stealth jet retains its performance edge well into the 2070s and beyond, also needs to ensure that computer systems are sufficiently “hardened” against cyberattacks and intruders.
Hack-Proof F-35
While all of the F-35’s advanced computing is naturally bringing unparalleled and potentially breakthrough systems to war in ways that may not have even been anticipated, added computer networking can also introduce new vulnerabilities.
What if an F-35’s computer was somehow “hacked,” derailed, denied service, or fed wrong information?
Pilots could be fed incorrect targets or given erroneous navigational details. Also of great concern, what if weapons targeting were compromised as well?
Across all weapons systems, including the F-35, the advantages and challenges of increased computer reliability can be described as a dual-pronged phenomenon.
Increased computer modernization, data sharing, and organized streams of information can also increase vulnerability. Are the unprecedented advantages afforded by advancing computing and software upgrades offset by an increased susceptibility to cyberattack?
Greater networking of combat nodes means an intruder could have a significant impact on multiple systems by merely penetrating or compromising a single platform, node, or point of entry. The need to safeguard F-35 computing has been on the Pentagon’s radar for many years now.
Interestingly, as early as 2016, the Air Force was working intensively on the need to “bake in” cyber protections and resilience.
About the Author: Kris Osborn, President of Warrior Maven and Aviation Expert
Kris Osborn is the President of Warrior Maven – Center for Military Modernization. Osborn previously served at the Pentagon as a highly qualified expert in the Office of the Assistant Secretary of the Army—Acquisition, Logistics & Technology. Osborn has also worked as an anchor and on-air military specialist at national TV networks. He has appeared as a guest military expert on Fox News, MSNBC, The Military Channel, and The HistoryChannel. He also has a Master’s Degree in Comparative Literature from Columbia.
