Sovereign Compute: The 1970s Financial Fragmentation, Replayed in AI
The EU, India, and the U.S. are each building sovereign AI compute stacks — and the organizations treating this as a compliance issue will spend the next decade restructuring under pressure.
Sovereign compute is fragmenting AI infrastructure the way 1970s banking laws fragmented global capital — and most organizations are building on a premise that's already been dismantled.
This week, a California federal judge issued a temporary restraining order blocking the U.S. Pentagon’s designation of Anthropic as a “supply chain risk.” The Pentagon’s grievance was specific: Anthropic refused to allow Claude to be used for “all lawful purposes” — a phrase that explicitly encompassed autonomous weapons targeting and mass surveillance programs. Anthropic sued. A federal court intervened before the designation could take effect.
The coverage treated this as a story about corporate ethics under pressure, or AI safety principles versus defense procurement, or the current administration’s appetite for autonomous military AI. All of those readings are accurate. None of them is the important one.
The important reading is this: an AI lab’s acceptable-use policy just became a legally contested instrument in a national security dispute. The terms-of-service document that Anthropic wrote with ethical intent is now functioning as a foreign policy document in a federal courtroom — and the precedents being set in that California district court will shape AI governance globally, the same way early U.S. internet law shaped platform regulation worldwide.
This is not an isolated event. It is an opening chapter.
The Fragmentation Has Already Begun
The same week, the EU advanced its program of sovereign compute clusters — AI Factories designed to process European AI workloads under European jurisdictional control. India’s national AI mission is building a sovereign GPU reserve explicitly framed as strategic national infrastructure. Brazil, Canada, South Korea, and the UK are each pursuing national AI compute strategies with the same underlying logic. China’s AI stack was never open.
Taken individually, these look like procurement decisions, nationalist politics, or regulatory compliance exercises. Taken together, they are something structurally different: the deliberate construction of incompatible AI infrastructure jurisdictions.
By 2028, a company deploying AI across the EU, India, and the United States will not be running a global AI system. It will be running three separate AI systems — each with different model provenance, training data, inference jurisdiction requirements, and audit obligations that cannot be satisfied by a single unified stack. The “global AI model” is not a future casualty of regulation. It is already a legal fiction. Most organizations just haven’t noticed the seams beginning to show.
The 1970s Called — And the Analogy Is Exact
The closest historical parallel is not GDPR, not the Cold War’s technology export controls, not even the internet’s content regulation phase. It is the 1970s fragmentation of global capital markets under conflicting bank secrecy laws.
Before the 1970s, capital moved relatively freely across major economies. Then a cascade of jurisdictional decisions — Swiss banking secrecy formalization, the Eurodollar market’s regulatory arbitrage, U.S. tax reporting requirements, competing financial sovereignty claims across dozens of jurisdictions — created a world where moving money internationally meant navigating genuinely incompatible legal infrastructure. Capital didn’t stop moving. It moved through jurisdictional proxies, legal structures, and infrastructure layers that existed specifically to manage incompatibility. The complexity became the business model.
The AI infrastructure fragmentation is following the same mechanics at higher velocity. The binding constraints will not arrive as a single decisive regulation. They will accumulate through procurement rules (government agencies requiring sovereign model provenance), data localization mandates (training data permissible only on approved infrastructure), model audit obligations (national regulators requiring access to model weights and training records), and liability allocation frameworks that vary by jurisdiction. Each individual requirement looks containable in isolation. In aggregate, they produce infrastructure stacks that cannot be unified without violating at least one sovereign constraint.
The organizations that navigated 1970s financial fragmentation profitably were not the ones that waited for global capital rules to stabilize. They were the ones that treated jurisdictional architecture as a first-order capital allocation decision — before the forcing function arrived. The same bet is available now in AI infrastructure, and the window to make it deliberately rather than reactively is narrowing fast.
The Security Agencies Just Drew the Perimeter
The intelligence agencies of the United States, United Kingdom, Australia, Canada, and New Zealand issued joint guidance this month classifying AI agent architectures as a national security-grade threat surface. The Five Eyes don’t coordinate cybersecurity advisories for theoretical concerns. When they do, they are documenting operational threat intelligence — patterns already observed, not patterns being modeled.
What the guidance signals — beneath the specific technical warnings about prompt injection, autonomous tool chaining, and cross-session memory persistence — is that allied governments have drawn a security perimeter around AI agent infrastructure. They are treating AI agents the same way they treat telecommunications infrastructure: as systems whose vulnerabilities are sovereign concerns, not enterprise IT problems.
This is the security dimension of the same fragmentation thesis. Sovereign compute doesn’t mean only “our country hosts the GPUs.” It means “our country controls the inference environment, the agent architecture standards, and the audit mechanisms for AI systems operating within our borders.” The CISA guidance is not a compliance checklist. It is a perimeter declaration.
Every enterprise that deployed an AI agent in the last eighteen months now has a documented intelligence-community risk assessment it has not yet read. More consequentially: every enterprise AI security strategy written before that advisory was designed for a world that has since changed.
The Anthropic Lawsuit as Preview, Not Anomaly
Zoom out from the specific legal dispute. What Anthropic’s lawsuit establishes is that the terms under which AI capabilities are deployed are politically contestable in ways that previously only physical infrastructure deployments were.
When a telecom company builds network infrastructure in a foreign country, it negotiates deployment terms with the host government — terms that can be modified by political change, revoked by national security designation, or constrained by sovereign infrastructure requirements. AI labs have operated, until now, as if their deployment terms were purely contractual matters between labs and enterprise customers, subject only to commercial law.
The Pentagon action establishes they are not. An AI lab’s model can be designated a supply-chain risk, an export-control violation, a national security concern, or an unapproved foreign technology — depending on the jurisdiction and the administration in power. The organizations most exposed are those running AI infrastructure built on the assumption that a global deployment model is durable. It is not. Acceptable-use policies are now, implicitly, foreign policy documents.
Who Benefits from Jurisdictional Agnosticism?
Every infrastructure fragmentation regime creates winners: organizations, legal structures, and architectural patterns that were built for incompatibility before the incompatibility arrived.
In the financial fragmentation of the 1970s, the winners were financial institutions with multi-jurisdictional structures, legal frameworks built for regulatory arbitrage, and capital allocation strategies that treated jurisdictional risk as a hedge-able variable — not a compliance overhead. The losers were institutions that assumed global capital rules would stabilize before restructuring was required.
In AI infrastructure fragmentation, the equivalent winners will be organizations that treat sovereign compute not as a compliance burden but as an architectural opportunity. This means: multi-region model deployment strategies designed around jurisdictional boundaries rather than geographic convenience. Data provenance architectures capable of demonstrating regulatory compliance in incompatible jurisdictions simultaneously. Governance structures that can operate credibly under different sovereign frameworks without depending on any single one for continuity.
This is precisely the context in which the network state architecture becomes practically attractive — not primarily as a governance philosophy, but as an infrastructure hedge. A community, organization, or enterprise that is architecturally stateless — holding operations across multiple jurisdictions without primary dependence on any — is exactly the structure suited to a world of sovereign compute stacks.
The lesson embedded in Próspera’s failure mode — the Honduras charter city now in World Bank arbitration over host-nation resistance — is clarifying: governance design works; political durability is the unsolved problem. Sovereign compute fragmentation creates enormous demand for organizational forms that don’t require political durability in any single jurisdiction. The network state thesis has been building for a world that is now arriving — but approaching from an unexpected direction, through infrastructure economics rather than governance philosophy.
The Practical Bet
The organizations waiting for definitive regulation before restructuring their AI infrastructure are waiting for a signal that will not come as a single clear directive. The fragmentation will not announce itself. It will accumulate through procurement decisions, vendor contracts, audit requirements, and incident responses — each individually reasonable, collectively producing incompatible stacks that cannot be unified retrospectively without enormous cost.
The practical bet is this: treat your AI infrastructure decisions today as if you will be required to maintain separate sovereign-compliant stacks for major regulatory jurisdictions by 2028. That timeline is implied by the current pace of sovereign compute investment and the regulatory frameworks now being finalized. Organizations making this architectural bet now — in vendor selection, in data provenance design, in deployment topology — are making a capital-efficient hedge. Organizations that wait will restructure under regulatory pressure, in a fragmented vendor market, after the practitioners who designed multi-jurisdictional infrastructure have already been hired elsewhere.
The Global AI Model Is Already Dead
The interesting strategic question is not whether AI infrastructure will fragment. It will — the trajectory is visible in the procurement decisions, diplomatic frameworks, and security classifications already on the record. The interesting question is whether organizations building on AI today are pricing jurisdictional fragmentation into their architecture, or whether they are making the same bet that 1970s global banks made: that integration is the stable state and fragmentation is a temporary disruption to be managed at the edges.
Fragmentation is not temporary. It is the natural equilibrium of powerful technologies that touch sovereignty. Every technology that became critical infrastructure — telecom, finance, energy — followed this arc. AI is following it faster, with higher stakes, and with almost no organizational preparation.
The Anthropic lawsuit, the Five Eyes guidance, the EU AI Factories, India’s sovereign GPU reserve — these are not separate news items. They are early visible evidence of a structural reorganization of AI infrastructure along jurisdictional lines.
Building for global AI interoperability in 2026 is not an optimistic bet. It is an expensive mistake, priced as if it were free. The organizations that will look prescient in five years are the ones treating sovereign compute fragmentation the same way serious investors treated financial fragmentation in 1973: not as a disruption to weather, but as the new architecture of the world — and the most important design constraint they have.
The cursor is blinking.


