<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1d1 20130915//EN" "JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" article-type="research-article" xml:lang="en"><front><journal-meta><journal-id journal-id-type="publisher-id">SDQ</journal-id><journal-title-group><journal-title>Security &amp; Defence Quarterly</journal-title><abbrev-journal-title>SDQ</abbrev-journal-title></journal-title-group><issn pub-type="epub">2544-994X</issn><issn pub-type="ppub">2300-8741</issn><publisher><publisher-name>Akademia Sztuki Wojennej</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">SDQ-54-00482</article-id><article-id pub-id-type="doi">10.35467/sdq/218621</article-id><article-categories><subj-group subj-group-type="heading"><subject>RESEARCH PAPER</subject></subj-group></article-categories><title-group><article-title>Overcoming politicisation with defence cooperation agreements: Why USAF EDI MILCON program advanced in Poland but stalled in Slovakia</article-title></title-group><contrib-group content-type="authors"><contrib contrib-type="author"><contrib-id contrib-id-type="orcid">https://orcid.org/0000-0002-7609-3683</contrib-id><name><surname>Ponomariov</surname><given-names>Branco</given-names></name><xref ref-type="aff" rid="aff1">1</xref><email>branco.ponomariov@utsa.edu</email></contrib><contrib contrib-type="author"><name><surname>Kruzel</surname><given-names>Chris</given-names></name><xref ref-type="aff" rid="aff2">2</xref></contrib><aff id="aff1"><label>1</label>Public Administration, University of Texas at San Antonio, 501 W Cesar E Chavez Blvd, 78207, San Antonio, TX, USA</aff><aff id="aff2"><label>2</label>Procurement, Joint Base San Antonio, 2330 Stanley Rd, 78234, San Antonio, USA</aff></contrib-group><pub-date pub-type="epub"><day>05</day><month>05</month><year>2026</year></pub-date><volume>54</volume><issue>2</issue><fpage>1</fpage><lpage>19</lpage><history><date date-type="received"><day>16</day><month>09</month><year>2025</year></date><date date-type="rev-recd"><day>25</day><month>02</month><year>2026</year></date><date date-type="accepted"><day>26</day><month>02</month><year>2026</year></date></history><permissions><copyright-statement>© 2026 B. Ponomariov and C. Kruzel published by War Studies University, Poland.</copyright-statement><copyright-year>2026</copyright-year><license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0"><license-p>This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).</license-p></license></permissions><abstract><p>Why did nominally similar US Air Force (USAF) European Deterrence Initiative (EDI) military construction (MILCON) programs advance in Poland but stall in Slovakia? We argue that defence cooperation agreements (DCAs) and their implementing arrangements (IAs) act as constitutive resources: they reconfigure dependence, raise the politicisation threshold, and amplify the payoff to routine buffering/bridging (bilingual deliverables, “key-points,” and predictable escalation). A most-similar systems’ comparison traces two country-level execution networks (USAF/United States European Command [EUCOM]/US Air Forces in Europe [USAFE], US embassy/office of defence cooperation, host-nation ministries/base commands). Evidence triangulates unclassified documents (2017–2020) and ten practitioner interviews (2021–2022) coded with a deductive scheme (Johnson’s five resource dependence theory (RDT) foci, and buffering/bridging), followed by inductive pattern coding. In Poland, a mature DCA/IA stabilised roles (including liaison authority) and compounded boundary work, culminating in a first completion in spring 2019. In Slovakia, absent DCA/IA and routine design actions were reframed as sovereignty incursions; politicisation cascaded and the program halted in March 2019. We refine RDT by specifying legal architecture as a first-order resource and derive actionable guidance for alliance managers.</p></abstract><kwd-group><kwd>European deterrence initiative</kwd><kwd>resource dependence theory</kwd><kwd>interorganisational networks</kwd><kwd>defence cooperation agreement</kwd><kwd>alliance management</kwd></kwd-group></article-meta></front><body><sec id="S1"><title>Introduction</title><p>In June 2014, the United States and North Atlantic Treaty Organization (NATO) launched the European Reassurance Initiative (later the European Deterrence Initiative [EDI]) to signal alliance cohesion and deter further Russian aggression following the annexation of Crimea. Among EDI’s five pillars, the US Air Force (USAF) undertook an ambitious military construction (MILCON) program to upgrade host-nation infrastructure across Central and Eastern Europe to support rotational presence, prepositioning, and interoperability. Most country programs advanced, but one did not. The EDI MILCON program exists to convert high-level deterrence policy into actual basing and infrastructure that United States and allied forces can use. Whether those projects advance or stall is therefore not a bookkeeping detail; it is a question of readiness and credibility for NATO amid renewed Russian aggression. By comparing two nearly identical efforts that diverged sharply, the article shows which institutional features (a defence cooperation agreement [DCA] with clear implementing arrangements [IAs]) let routine execution survive domestic politics. The result is both a cleaner theory of alliance implementation and a practical guidance for managers who have to deliver concrete outcomes, not just agreements.</p><p>While the EDI MILCON program progressed in Poland, it stalled in Slovakia despite comparable aims, timelines, and implementing organisations. This divergence presents a clear puzzle: why did nominally similar, coeval USAF programs under the same strategic umbrella yield sharply different implementation outcomes?</p><p>The existing scholarship offers partial answers. Resource dependence theory (RDT) explains how organisations adapt to external constraints by acquiring and managing critical resources, altering boundaries, and deploying buffering or bridging strategies (<xref ref-type="bibr" rid="ref6">Johnson, 1995</xref>; <xref ref-type="bibr" rid="ref14">Pfeffer and Salancik, 1978</xref>). Interorganisational network research shows how ties, role specialisation, and multilevel coordination shape collective performance under uncertainty (Moliterno and Mahoney, 2011; <xref ref-type="bibr" rid="ref15">Podolny and Page, 1998</xref>). Security cooperation studies, meanwhile, underscore the importance of legal–institutional arrangements, such as DCAs and IAs, in structuring rights, obligations, and operating authorities among allies (<xref ref-type="bibr" rid="ref8">Kinne, 2020</xref>; <xref ref-type="bibr" rid="ref18">Raustiala, 2000</xref>, 2002). The alliance politics and management literature investigates conflicts of interest between partners, and how states sign cooperation agreements in part precisely to limit the ability of domestic politics to interfere with the chosen course of action (<xref ref-type="bibr" rid="ref1">Abbott and Snidal, 2000</xref>; <xref ref-type="bibr" rid="ref2">Fearon, 1997</xref>; <xref ref-type="bibr" rid="ref16">Putnam, 1988</xref>; <xref ref-type="bibr" rid="ref23">Snyder, 1997</xref>). Yet these literatures rarely speak to one another in the context of real time, multinational program execution, where legal instruments, network structure, and resource dependencies intertwine to produce success or failure.</p><p>This article integrates these strands to explain the divergent outcomes of the USAF’s EDI MILCON programs in Poland (success) and Slovakia (failure). We argue that the presence (Poland) or absence (Slovakia) of a DCA functioned as a constitutive resource that conferred “structural rigidity” on the interorganisational network, enabling it to absorb shocks, coordinate across levels, and translate strategic intent into implementable projects. Where the DCA was missing or immature, other resources, such as communication capacity, host-nation relationships, office of defence cooperation (ODC) staffing, and senior-leader sponsorship became more fragile and more easily overwhelmed by exogenous political pressures. In short, legal arrangements were not merely contextual; they were causal in shaping the resource environment and the effectiveness of buffering/bridging moves predicted by RDT.</p><p>Empirically, we conduct a comparative case study of the Poland and Slovakia programs during fiscal years (FY) 2015–2019. The analysis draws on unclassified document review (official correspondence, schedules, and leadership briefings) and semi-structured interviews with USAF, United States European Command (EUCOM), ODC, and host-nation counterparts involved at strategic and operational levels. Treating the organisation (the EDI MILCON execution network in each country) as the unit of analysis, we apply <xref ref-type="bibr" rid="ref6">Johnson’s (1995)</xref> five RDT foci—resources, resource flows, resulting dependencies and power differentials, constraints, and leadership actions—to trace how critical resources were configured, which dependencies were formed, and how actors attempted to manage them via buffering (protecting boundaries) and bridging (spanning/reshaping boundaries).</p><p>Three contributions follow. First, we advance RDT by specifying legal instruments (e.g. DCAs and IAs) as first-order organisational resources in multinational public programs, not just background conditions. Doing so clarifies why otherwise sensible buffering/bridging tactics (e.g. adding linguists, formalising liaison protocols, issuing key-point memos, and drafting long-range development plans) can succeed in one setting, yet underperform in another: their payoff is conditional on a prior legal architecture that stabilises authority, access, and compliance expectations. Second, we join network scholarship with public administration practice by mapping how multilevel, intergovernmental teams (US Department of Defense [DoD] components, state/ODC, host-nation ministries, and implementing agents) actually reallocate roles and span boundaries under timeline and funding pressures, thus revealing predictable failure modes when nodal capacity (notably ODC) is under-resourced. Third, we derive actionable lessons for defence and foreign-assistance managers: sequence legal agreements before committing to accelerated design/construction timelines; invest early in bilingual communications and liaison capacity; and use long-range co-produced planning instruments to align host-nation land-use regimes, environmental responsibilities, and congressional line-item constraints.</p><p>Our preview of findings is straightforward. In Poland, an existing DCA (and iterative refinement via IAs) provided the legal scaffolding for direct liaison authority (DLA), iterative design reviews, and rapid troubleshooting, even amid political turnover. In Slovakia, absence of a mature DCA, coupled with rushed timelines and a politicised media environment, converted routine design actions into sovereignty controversies, swamped operational-level relationships, and culminated in a ministerial halt. Across cases, communication and ODC capacity mattered, but they mattered through the legal–institutional channel, where the DCA conferred authority and expectations, the same capacities amplified coordination; and if it did not, they could not offset macro-level constraints.</p></sec><sec id="S2"><title>Thesis and Contributions</title><p>Comparing two near-identical USAF EDI MILCON efforts, we show that a DCA/IA functions as a constitutive resource: it clarifies authorities and escalation, raises the threshold for politicisation, and increases the returns to standard boundary work (buffering/bridging). Whenever this legal architecture is missing (Slovakia), routine steps are reframed as sovereignty incursions and coordination saturates; whenever it is present (Poland), the same steps proceed to completion. The payoffs are: (i) a refinement to RDT (legal instruments as first-order resources that condition boundary-work productivity); and (ii) practical guidance for alliance managers on legality of sequencing, staffing embassy nodes, and institutionalising bilingual communication.</p><p>The remainder of the article proceeds as follows. We synthesise RDT, interorganisational network theory, and legal–institutional perspectives to derive a simple analytical framework. We then outline our comparative design and data. The findings section presents a structured, side-by-side analysis of resources, flows, dependencies, constraints, and leadership tactics in Poland and Slovakia. We close by discussing implications for theory and for the design and sequencing of large, multinational public programs (including ongoing Indo-Pacific initiatives) where success hinges on getting the legal architecture and network capacity “in place” before accelerating execution.</p></sec><sec id="S3"><title>Literature Review</title><sec id="S3_1"><title>Interorganisational networks and transgovernmental cooperation</title><p>The EDI MILCON program is executed through a dense web of US defence actors, host-nation ministries, and implementing agents: an archetypal interorganisational network, rather than a single hierarchy or a spot market transaction (<xref ref-type="bibr" rid="ref3">Hafner-Burton et al., 2009</xref>). Networks are defined by actors, ties, and interdependencies; the ties of some nodes shape, and are shaped by, others (<xref ref-type="bibr" rid="ref7">Kinne, 2013</xref>). This perspective directs attention away from isolated organisations (“trees”) and towards the organisation of collective action (“forest”) (<xref ref-type="bibr" rid="ref21">Salancik, 1995</xref>). It also requires a multilevel lens: operational project teams, embassy liaisons, and strategic leadership interact vertically and horizontally, and explanations that stay at one level risk missing key coordination mechanisms (<xref ref-type="bibr" rid="ref11">Moliterno and Mahony, 2011</xref>; <xref ref-type="bibr" rid="ref15">Podolny and Page, 1998</xref>, pp. 58–60).</p><p>Two implications follow for this study. First, relationships and the capacity to maintain them are not incidental but constitutive of performance in multinational programs. Second, networks in this domain are often transgovernmental, linking specialised agencies directly across borders with limited mediation by foreign ministries (<xref ref-type="bibr" rid="ref19">Raustiala, 2002</xref>). This is precisely the structure of EDI MILCON program, where ODC, USAF component commands, and host-nation technical offices interact routinely and repeatedly. Within such networks, formal legal instruments (e.g. DCAs) are not mere background; they shape who may coordinate with whom, on what terms, and with what authorities. That observation motivates the article’s core intent: theorising legal instruments as a resource inside the network, not only a constraint on it.</p></sec><sec id="S3_2"><title>Resource dependence theory in multinational public programs</title><p>The RDT explains how organisations survive by securing and managing critical external resources in settings of uncertainty and interdependence (<xref ref-type="bibr" rid="ref14">Pfeffer and Salancik, 1978</xref>). Five analytic foci structure the approach: (1) which resources matter; (2) how flows of those resources traverse organisational boundaries; (3) the dependencies and power differentials those flows create; (4) how dependencies constrain action; and (5) how leaders manage dependence (<xref ref-type="bibr" rid="ref6">Johnson, 1995</xref>). Leaders do so through buffering (protecting and insulating organisational boundaries) and bridging (spanning or shifting boundaries) (<xref ref-type="bibr" rid="ref6">Johnson, 1995</xref>). Subsequent work catalogues concrete tactics—including political action, formal interorganisational arrangements, and board-like oversight mechanisms among them—to reduce environmental dependence (<xref ref-type="bibr" rid="ref4">Hillman et al., 2009</xref>).</p><p>Three refinements adapt RDT to the context of EDI. First, criticality matters: not all resources are equally important. The theory distinguishes magnitude from criticality (how essential the resource is to core tasks, and how concentrated it is in the environment) (<xref ref-type="bibr" rid="ref13">Nienhüser, 2008</xref>; <xref ref-type="bibr" rid="ref14">Pfeffer and Salancik, 1978</xref>). Second, in multinational programs, the line between “environment” and “organisation” is blurred: boundaries are defined by patterns of interlocked or coordinated behaviours, not by formal charts (<xref ref-type="bibr" rid="ref14">Pfeffer and Salancik, 1978</xref>). Third, in transgovernmental settings, legal instruments (DCAs and IAs) can be conceptualised as first-order organisational resources that stabilise access, authority, and compliance expectations—altering the payoff to buffering/bridging tactics, such as bilingual communications support, liaison protocols, and long-range development planning (<xref ref-type="bibr" rid="ref18">Raustiala, 2000</xref>, 2002, 2005; <xref ref-type="bibr" rid="ref8">Kinne, 2020</xref>).</p></sec><sec id="S3_3"><title>Legal–institutional architecture as a constitutive resource</title><p>Compliance and effectiveness research in international cooperation shows that formal instruments shape behaviour not only by prescribing rules but also by structuring the ongoing relationships among specialised agencies (<xref ref-type="bibr" rid="ref18">Raustiala, 2000</xref>, 2002). In defence cooperation, DCAs delineate rights, obligations, processes, and authorities for basing, construction, environmental remediation, access, and information sharing; IAs localise these commitments for specific projects. In network terms, DCAs reconfigure the infrastructure of ties by legitimating DLA, clarifying role responsibilities, and reducing transaction costs for recurrent coordination. Consequently, DCAs function as structural rigidity within the network: they dampen shocks from domestic political turbulence and help translate strategic intent into operational execution. Whenever such an instrument is absent or immature, other resources, for example communication capacity, ODC staffing, and leader sponsorship, become more fragile and more easily swamped by exogenous pressures. This logic is consistent with both the RDT emphasis on managing dependence through boundary work (buffering/bridging) and with network accounts of how formal and informal rules shape tie formation and durability—albeit with emphasis on informal rules (<xref ref-type="bibr" rid="ref15">Podolny and Page, 1998</xref>, pp. 60–62; also, <xref ref-type="bibr" rid="ref7">Kinne, 2013</xref>, 2020; <xref ref-type="bibr" rid="ref11">Moliterno and Mahony, 2011</xref>).</p></sec><sec id="S3_4"><title>Alliance politics bridge</title><p>Our claim complements alliance-management work on commitment and domestic constraints: DCAs operate as hand-tying instruments that align host-nation decision rights with implementation and raise the domestic political costs of reversal (<xref ref-type="bibr" rid="ref2">Fearon, 1997</xref>; <xref ref-type="bibr" rid="ref12">Morrow, 1994</xref>; <xref ref-type="bibr" rid="ref16">Putnam, 1988</xref>; <xref ref-type="bibr" rid="ref23">Snyder, 1997</xref>). Legalisation—through obligation, precision, and delegation—allocates authority and structures expectations that stabilise cooperation (<xref ref-type="bibr" rid="ref1">Abbott and Snidal, 2000</xref>; <xref ref-type="bibr" rid="ref20">Raustiala, 2005</xref>). In this view, the agreement does not merely add resources; it constitutes the execution network, clarifying decision rights and escalation paths, so that boundary work (buffering/bridging) yields progress, rather than politicisation (<xref ref-type="bibr" rid="ref6">Johnson, 1995</xref>; <xref ref-type="bibr" rid="ref14">Pfeffer and Salancik, 1978</xref>). Legalisation—via obligation, precision, and delegation—allocates authority and structures expectations that stabilise cooperation (<xref ref-type="bibr" rid="ref1">Abbott and Snidal, 2000</xref>, pp. 421–424; <xref ref-type="bibr" rid="ref20">Raustiala, 2005</xref>). Thus, a DCA/IA bundle constitutes the execution network—clarifying decision rights and escalation paths—so that RDT boundary work (buffering/bridging) yields progress, rather than politicisation (<xref ref-type="bibr" rid="ref2">Fearon, 1997</xref>, pp. 69–71; <xref ref-type="bibr" rid="ref6">Johnson, 1995</xref>; <xref ref-type="bibr" rid="ref9">Leeds et al., 2000</xref>; <xref ref-type="bibr" rid="ref14">Pfeffer and Salancik, 1978</xref>; <xref ref-type="bibr" rid="ref16">Putnam, 1988</xref>, pp. 434–436; <xref ref-type="bibr" rid="ref17">Rapport and Rathbun, 2021</xref>; <xref ref-type="bibr" rid="ref23">Snyder, 1997</xref>).</p></sec><sec id="S3_5"><title>From synthesis to expectations</title><p>Bringing these strands together yields clear expectations that guide the comparative analysis. First, transgovernmental relationships cannot be fully understood through the lenses of classic RDT, emphasising resources and informal network ties. Presence of DCA—a legal instrument—leads to higher network resilience and execution speed. A mature DCA should correlate with faster problem resolution, more stable coordination across strategic/operational levels, and less susceptibility to politicisation of routine design actions.</p><p>Second, capacity of ODC is conceptualised as a pivotal node, because ODCs sit at the US–host-nation interface in a transgovernmental network; their staffing, mission clarity, and bilingual capabilities should mediate the returns to legal scaffolding, thereby amplifying benefits under a DCA and partially compensating (but rarely substituting) when it is absent.</p><p>Third, buffering/bridging tactics, such as direct liaison protocols, key-point memos, dual-language deliverables, and long-range development plans, may be only conditionally effective; they all are essential resources and strategies, but they should yield higher payoffs when legal–institutional scaffolding stabilises authority and expectations; without it, these tactics face diminishing returns.</p><p>By reframing the literature this way, the article speaks back to three communities. For RDT, it identifies legal instruments as a neglected class of resources in public and multinational programs, and specifies how they condition the effectiveness of buffering/bridging. For network scholarship, it shows how formal agreements alter network structure and affiliate durability in practice. For public administration and security cooperation, it clarifies why some multi-actor defence programs proceed while others stall despite similar funding, timelines, and stated strategic aims.</p></sec><sec id="S3_6"><title>Theoretical framework</title><p>We treat each country’s EDI MILCON execution network (USAF/EUCOM/US Army Corps of Engineers [USACE]/US Air Force Civil Engineer Center [AFCEC]–US embassy/ODC–host-nation ministries and base commands) as the organisation. Following RDT, organisational behaviour reflects how actors secure and manage critical external resources under uncertainty (<xref ref-type="bibr" rid="ref6">Johnson, 1995</xref>; <xref ref-type="bibr" rid="ref14">Pfeffer and Salancik, 1978</xref>). We operationalise RDT through Johnson’s five foci and the buffering/bridging repertoire, and we specify how legal instruments (DCAs and IAs) enter the model as the first-order resources that condition the effectiveness of other tactics. We align evidence to <xref ref-type="bibr" rid="ref6">Johnson’s (1995</xref>, pp. 1, 5–7) five RDT foci.</p></sec><sec id="S3_7"><title>Resources (what matters)</title><p>We define resources as inputs that the execution network cannot autonomously generate but must obtain or stabilise from its environment. For EDI MILCON program, the core set is: (1) legal scaffolding: DCA and IAs (access, environmental, information-sharing, and liaison provisions); (2) communication capacity: bilingual technical communication, dual-language deliverables, shared terminology/protocols, and “key-points” documentation discipline; (3) boundary nodes and staffing: ODC manpower/mission clarity, and availability of in-theater technical liaisons; (4) senior-leader sponsorship: timely engagement from DoD/embassy/Host Nation principals to unblock cross-boundary issues; (5) land/use and permissions: site access, easements/zoning equivalents, environmental constraints; and (6) temporal and fiscal resources: schedule latitude and obligation rules, and stability and timing of appropriations.</p><p>We hypothesise the DCA as a constitutive resource: it formalises authorities, legitimates direct ties, lowers transaction costs, and creates structural rigidity in the network.</p></sec><sec id="S3_8"><title>Resource flows (how they move)</title><p>Flows occur through codified interfaces (e.g. DLA, IAs, letters of intent [LOI], long-range development plans [LRDPs]), routine artifacts [dual-language submittals, design review cycles], and convening structures [steering committees, and joint site visits]. Smooth flows mean faster mutual adjustment and fewer escalations; blocked flows manifest as mismatches in expectations, cascading rework, or politicisation of routine steps.</p></sec><sec id="S3_9"><title>Dependencies and power differentials (what that creates)</title><p>Whenever access to a critical resource is concentrated (e.g. only the Ministry of Foreign Affairs/Ministry of Defence [MFA/MoD] can confer land/sovereignty permissions; only State/OSD can finalise DCA text), the network becomes dependent on that locus. Absence of DCA heightens dependence on ad hoc substitutes (personal ties, and NATO habits of cooperation), raising vulnerability to domestic politics. Thin ODC staffing increases dependence on overextended project managers or HN translators, amplifying miscommunication risk.</p></sec><sec id="S3_10"><title>Constraints (how dependency manifests)</title><p>Constraints show up as: (a) legal ambiguity (e.g. lack of a shared rulebook may result in contested authority); (b) communication loss (terminology drift, translation error); (c) procedural friction (unclear land/environ responsibilities); and (d) politicisation shocks (media or party framing of technical steps as sovereignty threats). These tighten schedule windows and trigger risk-averse slowdowns or halts.</p></sec><sec id="S3_11"><title>Leadership actions (how actors manage dependency)</title><p>Leaders deploy the classic RDT toolkit, buffering and bridging. The first, buffering (protect/insulate boundaries), may manifest in strategies, such as embedding linguists in contracts; requiring dual-language deliverables; standardising “key-points” memos signed at meeting close; shoring up ODC with dedicated MILCON liaison capacity; pre-clearing terminology (Automatic Data Processing [ADP]/Management Development Programs [MDP]/LRDP), that is strategies to insulate core activities of the program from external dependencies. The second, bridging (span/reshape boundaries), may manifest informalising DLA; co-producing LRDPs to align US/HN roadmaps and land-use plans; issuing LOI to clarify roles; creating steering committees (board-like oversight); and, when needed, political action (principal-level statements/op-edits/ministerials) to reset expectations. Critically, we propose that the payoff to these tactics is conditional on DCA status: with legal scaffolding, buffering/bridging compounds; without it, returns diminish and may even invert under politicisation.</p></sec><sec id="S3_12"><title>Propositions</title><p>We derive three key propositions that structure both comparison and coding:</p><p>P1 (constitutive legality): The presence of a DCA/IA increases the system’s capacity to absorb shocks by clarifying authorities, sequencing, and escalation paths.</p><p>P2 (conditional payoff to boundary work): Under a DCA/IA, buffering (linguists, bilingual deliverables, and “key-points” memos) and bridging (principal engagement and steering routines) yield increasing marginal returns; without it, returns diminish as politicisation increases.</p><p>P3 (network chokepoint): Embassy/ODC capacity mediates P1–P2: with a legal scaffold, extra ODC bandwidth translates into execution speed; without it, the node saturates and becomes a visible program liability (thin capacity invokes frictions even with a DCA).</p><p>These propositions are implemented as a deductive codebook with sub-codes for specific tactics, followed by pattern coding; interview and documentary evidence is then matched to the propositions in the findings. Operationalisation and coding details are provided in the below-mentioned section, “Methodology.”</p></sec></sec><sec id="S4"><title>Methodology</title><sec id="S4_1"><title>Comparative case design and unit of analysis</title><p>We employ the most-similar systems design: two NATO allies received the EDI MILCON investments on a comparable timeline and under shared US/NATO governance, yet diverged in outcomes. The unit of analysis is each country-level execution network linking US Air Force actors (USAF, EUCOM, and US Air Forces in Europe [USAFE]), the US embassy/ODC, host-nation ministries and agencies, and implementing contractors.</p></sec><sec id="S4_2"><title>Data and sources</title><p>We triangulate two streams of evidence. (a) Documentary: unclassified official correspondence, schedules, fact sheets, and public statements (2017–2020). (b) Semi-structured interviews: ten practitioner interviews (e.g. officers and civil engineers) conducted in 2021–2022 by phone or encrypted email; all interviews were conducted on a non-attribution basis and anonymised. Interview prompts focused on authorities, sequencing, and boundary-work practices (liaison, translation, and artifacts).</p></sec><sec id="S4_3"><title>Analytical approach and coding</title><p>Analysis is theory-guided. We developed a deductive codebook anchored in <xref ref-type="bibr" rid="ref6">Johnson’s (1995</xref>, pp. 2, 5–8) five RDT foci—resources, resource flows, dependencies and power, constraints, and leadership actions—and the buffering/bridging repertoire. We coded interview memos and documents in a first pass, recoded in a second pass to consolidate themes, and built a cross-case matrix (Poland vs. Slovakia) and event timeline for process tracing and pattern matching. We maintained an audit trail of decisions, produced case matrices and timelines (<xref ref-type="bibr" rid="ref10">Miles et al., 2020</xref>), and conducted pattern matching and process tracing across sources.</p></sec><sec id="S4_4"><title>Operationalisation</title><p>The outcome, execution effectiveness, is judged by (i) attainment and continuity of planned milestones on the documented timeline (e.g. senior leader meeting [SLM] and initial engagements, site access, iterative design reviews, award, and start), (ii) time-to-first-award, and (iii) continuity (absence of a formal ministerial halt). Key conditions include legal architecture (presence/absence and maturity of a DCA and any IAs), ODC capacity (staffing, bilingual competence, and mandate clarity), communication discipline (embedded linguists, dual-language deliverables, and signed “key-points” memos), leadership escalation (number/timing of principal interventions), and land/environmental responsibility clarity.</p><p>We also operationalise two families of mechanisms. First, bridging and governance tactics—including DLA, co-produced LRDPs, and steering/board-like routines—are coded as sub-codes linked to legal scaffolding and leadership escalation. Second, politicisation episodes (media frames, parliamentary salience, and ministerial statements) are coded as constraints that compress schedule latitude and reconfigure authority claims. Finally, resource flows are captured via the presence, timeliness, and completeness of bilingual submittals, signed “key-points” memoranda, and documented design–review cycles, with blockages recorded as returned submittals or formal requests for clarification.</p></sec><sec id="S4_5"><title>Use of interview material</title><p>Interview evidence appears in the section, “Findings,” through attributed roles (e.g. ODC engineer, host-nation planner) and is tied to specific coded themes in the analysis matrices. To preserve non-attribution, we cite interview material in-text as “Interview, role” and cross reference it to coding tables themes. Interview evidence is presented through role-attributed paraphrases and selective verbatim quotations. See <xref ref-type="app" rid="app1">Appendix A</xref> for the interview protocol and <xref ref-type="app" rid="app2">Appendix B</xref> for the respondent index (on role-based non-attribution basis).</p></sec><sec id="S4_6"><title>Data availability and ethics</title><p>Redacted interview memos, the codebook, and the cross-case matrix are stored on an encrypted university drive; access is provided to editors/reviewers under non-attribution assumption.</p><p>Audio recordings were not retained. The project involved professional experiences and organisational processes, and collected neither the sensitive personal data nor the classified or otherwise sensitive organisational data.</p></sec></sec><sec id="S5"><title>Findings</title><p>We compare the country-level execution networks for Poland (advanced) and Slovakia (stalled). Evidence combines the program timelines, official correspondence, and practitioner interviews, coded to Johnson’s five RDT foci and the buffering/bridging toolkit. To separate timelines from conditions, <xref ref-type="table" rid="T1">Table 1</xref> reports milestones in strict chronology for each country. <xref ref-type="table" rid="T2">Table 2</xref> summarises the enabling constraints and boundary work that explain the divergence.</p><table-wrap id="T1" orientation="portrait" position="float"><label>Table 1.</label><caption><p>Program chronology by country. Note. DCA: defence cooperation agreement; EDI: European deterrence initiative.</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th align="left">Milestone</th><th align="left">Poland</th><th align="left">Slovakia</th></tr></thead><tbody valign="top"><tr><td align="left">Senior-leader and initial engagements</td><td align="left">Senior leader meeting in May 2015, followed by base visits in November 2015.</td><td align="left">Senior leader meeting and base visits in January–February 2017.</td></tr><tr><td align="left">Requirements package submission</td><td align="left">Requirements flowed through the FY 2015–2017 EDI ramp under established procedures.</td><td align="left">The FY 2018 requirements package was submitted in December 2017.</td></tr><tr><td align="left">Early contracting and design actions</td><td align="left">Routine design and contracting actions proceeded in 2016–2017 understanding authorities.</td><td align="left">In early 2018, a design–support solicitation was mischaracterised in the media, triggering crisis meetings.</td></tr><tr><td align="left">Major political shock</td><td align="left">Routine political turnover was managed within established channels.</td><td align="left">A national shock in February 2018 intensified sovereignty framing and controversy.</td></tr><tr><td align="left">Strategic communications and escalation</td><td align="left">Principal engagement occurred as needed within the DCA and implementing-arrangement rulebook.</td><td align="left">The US ambassador published an op-ed; elite contestation continued.</td></tr><tr><td align="left">Program decision by the Ministry of Defence</td><td align="left">No ministerial stop was issued.</td><td align="left">In March 2019, the Ministry of Defence ordered a formal stop.</td></tr><tr><td align="left">Physical outcome by 2019</td><td align="left">The first project reached completion in spring 2019.</td><td align="left">No construction started; the program remained halted.</td></tr></tbody></table></table-wrap><table-wrap id="T2" orientation="portrait" position="float"><label>Table 2.</label><caption><p>Conditions and boundary work that map to outcomes (not chronological). Notes. DCA: defence cooperation agreement; EDI: European deterrence initiative; LRDP: long-range development plan; IA: implementing arrangements.</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th align="left">Dimension</th><th align="left">Poland</th><th align="left">Slovakia</th></tr></thead><tbody valign="top"><tr><td align="left">Legal scaffolding (DCA + IA)</td><td align="left">A DCA was in force, and IAs were refined over time. This legal architecture stabilised roles and authorities.</td><td align="left">No suitable DCA was in force for the EDI scope during the study period, and there was no implementing-arrangement anchor.</td></tr><tr><td align="left">Direct liaison authority</td><td align="left">Direct liaison authority was formalised in December 2015 with Office of Defence Cooperation oversight.</td><td align="left">Coordination relied on ad hoc ties and lacked DCA-anchored liaison authority.</td></tr><tr><td align="left">Planning instrument</td><td align="left">A long-range development plan was adopted as the program matured, aligning United States, host-nation, and NATO roadmaps.</td><td align="left">An LRDP was discussed and pursued but could not substitute for a missing DCA.</td></tr><tr><td align="left">Buffering practices</td><td align="left">Embedded linguists, dual-language deliverables, and signed “key-points” memos were institutionalised.</td><td align="left">Similar practices were attempted but produced diminishing returns under politicisation.</td></tr><tr><td align="left">Bridging and governance</td><td align="left">Letters of intent, implementing-arrangement updates, and periodic principal engagement inside the rulebook provided predictable escalation.</td><td align="left">Ambassadorial statements and meetings occurred but the lack of a legal anchor limited effectiveness.</td></tr><tr><td align="left">Politicisation threshold</td><td align="left">Legal scaffold raised the threshold for politicisation and dampened shocks.</td><td align="left">Routine steps were reframed as sovereignty incursions, lowering the threshold for politicisation.</td></tr><tr><td align="left">Net execution result (to 2019)</td><td align="left">The program progressed to a first completion.</td><td align="left">The program was stalled and formally halted.</td></tr></tbody></table></table-wrap><p>As <xref ref-type="table" rid="T1">Table 1</xref> shows, both programs advanced through initiation and early design, but Slovakia crossed a politicisation threshold in early 2018 and never recovered, culminating in a ministerial stop in March 2019, whereas Poland proceeded to completion.</p><p>In Slovakia, the FY 2018 package (December 2017) moved into design support when a USACE solicitation was mischaracterised in domestic media, reframing routine steps as sovereignty issues. Without a DCA/IA, matters that “normally” would sit in working groups escalated to principles amid rising salience and turnover (timeline through early 2018). As the Slovakia (SK) ODC put it, “in reality the Slovak political climate at the time … was not as pro-West as the current government …” and “EDI turned into a political pawn … they said, hey look America is infringing on our sovereignty … and that poisoned the well.” In March 2019, the MoD issued a formal stop. AFCEC project correspondence concluded the following: “Opposing HN politicians used the accelerated designing as a scare tactic to effectively halt progression. Had a DCA been in place, the opposing political party would’ve had less ‘ammo’ to work with.” Another AFCEC PM was blunter: “The rush to get designs in place contributed to sabotaging the effort. DCA establishment should have been a priority.</p><p>In comparison, Poland wasn’t “easy.” The Poland program also faced intra-US coordination frictions and limited ODC bandwidth; however, those issues were managed inside established authorities rather than repoliticising the execution. As the Poland (PL) ODC noted, “We are so disorganised on the Polish effort that it does make it a little difficult in Poland,” with the office focused “mainly on FMS<sup><xref ref-type="fn" rid="fn1">1</xref></sup> and case development for FMS.” When asked directly about how often the Polish ODC relied on the DCA in Poland, their response was “nope, not once,” which is consistent with practice: IAs operationalise the DCA’s authorities, and teams interact with the IA text during execution. Thus, the ODC quip is understandable, as the AFCEC PM often referred to IA: the implementing arrangement “is a legal document that provides granular detail in support of the overarching DCA … who is responsible for remediation… [and] protection of environmentally sensitive areas,” assembled primarily in-theater (AFCEC supervisor).</p><p><xref ref-type="table" rid="T2">Table 2</xref> summarises conditions—legal scaffolding, liaison authority, planning instruments, and boundary-work practices—linked to divergent outcomes.</p><p>With a DCA/IA, routine boundary work (buffering/bridging) has predictable payoffs and escalation stays inside the rulebook. In the absence of that legal anchor, similar practices yield diminishing returns, as routine steps are reframed in sovereignty terms, aligning with the observed halt.</p><p><xref ref-type="table" rid="T3">Table 3</xref> and subsequent sections trace these rows with process evidence from documents and interviews, coded to Johnson’s five RDT foci and to buffering/bridging practices.</p><table-wrap id="T3" orientation="portrait" position="float"><label>Table 3.</label><caption><p>Comparative analysis by Johnson’s five RDT foci. Notes. RDT: resource dependence theory; DCA: defence cooperation agreement; LRDP: long-range development plan; ODC: Office of Defence Cooperation; IAs: implementing arrangements; LOIs: letters of intent.</p></caption><table frame="border" rules="groups"><thead valign="top"><tr><th align="left">RDT focus</th><th align="left">Poland (success case)</th><th align="left">Slovakia (failure case)</th></tr></thead><tbody valign="top"><tr><td align="left">Resources (critical)</td><td align="left">DCA and IAs; direct liaison; LRDP; ODC liaisoning; senior leader access.</td><td align="left">DCA absent/immature; ODC stretched; communications capacity strained; political environment hostile.</td></tr><tr><td align="left">Resource flows</td><td align="left">Codified channels (direct liaison; signed “key-points” after meetings) enabled consistent transmission through HN bureaucracy.</td><td align="left">Flows repeatedly blocked or diverted by politicisation and lack of shared rulebook; “tug-of-war” between operational progress and strategic drag.</td></tr><tr><td align="left">Dependencies and power</td><td align="left">DCA reduces dependence on ad hoc political cover; IA clarifies authorities (e.g. environmental responsibilities).</td><td align="left">Without DCA, dependence on media/politics grew; ODC became a single choke point; NATO working ties held only at the operational level.</td></tr><tr><td align="left">Constraints</td><td align="left">Episodic delays handled via memoranda to ODC and senior-level engagement.</td><td align="left">Legal ambiguity enabled sovereignty framing; domestic shocks (2018) hardened constraints and stalled DCA.</td></tr><tr><td align="left">Leadership actions</td><td align="left">Buffering: linguists, dual-language artifacts, signed key-points; bridging: formal letters/LOIs, LRDP, emerging steering committee (board-like).</td><td align="left">Buffering/bridging attempted (dual-language deliverables; LRDP push) but insufficient without DCA; ambassador’s op-ed as political action could not offset legal vacuum.</td></tr></tbody></table></table-wrap><p>Process tracing isolates three mechanisms that account for the divergence.</p><sec id="S5_1"><title>Constitutive legality</title><p>Across documents and interviews, respondents emphasised that the legal architecture did not merely constrain activity but created the authority needed to act. In Poland, the prior DCA formalised DLA, clarified roles and responsibilities (including information sharing), and provided predictable jurisdictional pathways. This legal scaffolding stabilised coordination and accelerated routine design steps consistent with work on how agreement form shapes organisational behaviour (<xref ref-type="bibr" rid="ref6">Johnson, 1995</xref>, pp. 5–8; <xref ref-type="bibr" rid="ref20">Raustiala, 2005</xref>, pp. 581–584). Respondents noted that, even when responsibilities occasionally had to be assumed across organisational boundaries, Poland’s ODC could absorb and route those tasks within the rule set and resist politicisation pressures. By contrast, in Slovakia, ordinary coordination lacked a shared rulebook and became contestable, pulling senior officials into decisions that would otherwise have remained a routine.</p></sec><sec id="S5_2"><title>Politicisation cascade (Slovakia)</title><p>An early public mischaracterisation of a contracting/design step was amplified by parliamentary debate and ministerial turnover, reframing technical design actions as a sovereignty threat. Without a DCA to anchor interpretations, escalations consumed managerial bandwidth and interrupted contracting. Respondents from the Slovak side described the political climate during the period as less receptive to the program and noted that EDI became a vehicle for domestic contestation. The environment further deteriorated following the widely reported killing of a journalist and subsequent political upheaval (<xref ref-type="bibr" rid="ref22">Sirotnikova, 2020</xref>); opposition actors increased pressure to reject EDI as sovereignty infringement. Public statements—including an ambassadorial op-edit underscoring principles of defence cooperation—did not reverse this trajectory. As one AFCEC project manager put it in official correspondence, accelerated design was used as a scare tactic to halt progression and “had a DCA been in place, the opposing political party would’ve had less ‘ammo’ to work with.”<sup><xref ref-type="fn" rid="fn2">2</xref></sup></p></sec><sec id="S5_3"><title>Communication discipline and ODC capacity</title><p>Poland’s network invested in bilingual artifacts, signed “key-points” after meetings, and embedded linguists at critical interfaces—classic buffering tactics—while a staffed ODC transmitted credibility across organisational boundaries. LRDPs functioned as bridging devices that aligned host-nation and US horizons. In Slovakia, ODC staffing was thinner and translation practices more ad hoc; these efforts were diligent but could not offset legal ambiguity. Differences in land-use regimes (e.g. zoning versus easements and fragmented ownership) compounded the problem: Poland’s legal scaffolding offered tractable routes through permissions and environmental responsibilities, whereas ambiguity in Slovakia raised transaction costs and stall risk.</p></sec><sec id="S5_4"><title>Synthesis</title><p>Whenever a DCA is present, buffering (bilingual artifacts, embedded linguists, and structured meeting discipline) and bridging (DLA, LRDPs, and steering/board-like routines) compound to stabilise resource flows and insulate projects from politicisation. ODC capacity moderates these effects: thin staffing and unclear mandates increase reliance on improvised ties, especially under weak legal architecture. Consistent with this pattern, Poland moved to completion of the first project in spring 2019, whereas Slovakia formally halted negotiations in March 2019 (<xref ref-type="bibr" rid="ref24">Spectator Staff, 2019</xref>).</p></sec></sec><sec id="S6"><title>Discussion</title><sec id="S6_1"><title>Implications for resource dependence theory</title><p>Our analysis suggested that legal instruments are not just resources but first-order resources. The comparative evidence underscores that DCAs are not mere background constraints but constitutive resources that shape the dependence structure of multinational public programs. In Poland, EDI program implementation was not seamless, but the DCA—iteratively supported by IAs—reduced environmental uncertainty, legitimised DLA, and stabilised expectations about roles (e.g. environmental responsibilities), enabling the network to convert strategic intent into concrete milestones. In Slovakia, the absence of a suitable DCA magnified dependence on ad hoc ties and left routine design actions vulnerable to sovereignty framings and politicisation, thereby culminating in a ministerial halt.</p><p>The analysis also suggested that, as important as buffering and bridging are, the return on them is conditional. Classic RDT tactics, such as buffering (in this case, strategies such as bilingual documentation, signed “key-points,” and embedded linguists) and bridging (in this instance: DLA, LRDPs, and steering/board-like oversight), paid off in Poland because legal scaffolding conferred structural rigidity; the same tactics showed sharply diminishing returns in Slovakia in the absence of a DCA. This conditionality refines RDT’s generic prescriptions by specifying when boundary work scales and when it stalls in transgovernmental settings.</p><p>Thus, the findings sharpen RDT’s distinction between magnitude and criticality: resources such as communication funds and staff were important in both cases, but the critical resource—the one whose absence reconfigures all other dependencies—was the DCA. In effect, legality functioned as a meta-resource that determined the payoff to all other inputs (e.g. communication capacity, ODC staffing, and principal engagement): high in both criticality and magnitude, but not constitutive.</p></sec><sec id="S6_2"><title>Implications for alliance politics and defence cooperation</title><p>The EDI MILCON program turns alliance promises into usable infrastructure in a deteriorating European security environment. Our comparison isolates a fixable lever—a DCA with clear IAs—that prevents routine design/permits from being derailed by domestic politics. Thus, the study highlighted the gaps that can form between treaty context and operational authority. Alliance politics scholarship often treats formal agreements as macro backdrops; however, the cases also show they operate as micro-level operating authorities that enable recurrent, low-friction collaboration among specialised agencies (USAF, ODCs, and host-nation technical ministries). Where a DCA exists, it routinises cross-border coordination (e.g. direct liaison), reduces transaction costs for design reviews, and clarifies sensitive issues (land use and environmental remediation). Where it does not exist, even well-intentioned steps (e.g. soliciting design support) can be reframed domestically as sovereignty incursions.</p><p>The study also illustrated the variability of politicisation thresholds. The Slovak sequence demonstrates how much the lack of legal scaffolding lowers the threshold for politicisation cascades: an early media mischaracterisation, followed by a national shock and elite contestation, swamped operational relationships, and frozen progress. In the words of one of the respondents, “Opposing HN politicians used the accelerated designing as a scare tactic… Had a DCA been in place, the opposing political party would’ve had less ‘ammo’ to work with” (AFCEC PM, official correspondence). By contrast, Poland’s legal architecture dampened similar shocks through predictable escalation channels and implementing arrangement updates, preserving momentum. For alliance managers, the lesson is that sequencing matters: secure or mature the DCA before compressing design and award timelines.</p><p>Finally, key nodes in transgovernmental relationships serve not only as implementers but also as credibility transmitters. ODCs guard at the interface of diplomacy and implementation. Their effectiveness in both is contingent on both resources and legal backing. Their staffing, bilingual competence, and mandate clarity condition whether allied commitments propagate intact through host-nation bureaucracies and publics. Under-resourced ODCs may become chokepoints, especially in the absence of a legal backing, such as DCAs; adequately resourced ODCs act as credibility transmitters that keep alliance promises legible and actionable.</p></sec><sec id="S6_3"><title>Robustness</title><p>Three conceiveable alternative explanations do not overturn the observed mechanism. ODC capacity alone could be conceptualised as a driver of success or failure; our observations suggest that ODC capacity alone is conditional—without DCA/IA it saturates and does not reverse the stall. The outcomes cannot be explained with local politics alone either: routine turnover occurred in both settings; only Slovakia crossed a politicisation threshold. Finally, it is not likely that the outcomes were affected by funding cadence: both cases drew from the same EDI lines/windows and timing does not co-vary with divergence.</p></sec></sec><sec id="S7"><title>Conclusions</title><p>This study explains why nominally similar EDI MILCON projects succeeded in Poland but stalled in Slovakia. The answer matters because infrastructure delivery is the operational hinge between commitments on paper and forces on the ground at a time of Russian coercion and war. We identify the legal infrastructure—a DCA and its IAs—as the difference-maker that raises the politicisation threshold and keeps routine boundary work productive.</p><p>This comparative analysis accounts for divergent EDI MILCON outcomes by locating legal architecture at the centre of resource dependence specifically. Our main finding is that legal architecture reconfigures dependence. In Poland, DCA/IA raised the politicisation threshold and made buffering/bridging productive; in Slovakia, their absence enabled politicisation and the program was halted. DCAs and IAs act as first-order resources that enable classic bridging and buffering tactics; without them, politicisation thresholds are low and managerial attention is consumed by boundary disputes.</p><p>Accordingly, the main lesson learned is that managers should sequence legality before speed: legal structure is not a background—it reconfigures dependency. Attempting to “jump-start” design without a settled DCA/implementing-arrangement bundle creates vulnerability to conflict (even if routine and predictable) and fractures coordination. Boundary-work should be institutionalised: codify DLA, require bilingual artifacts and “key-points,” and co-produce LRDPs to synchronise host-nation, NATO, and the US timelines. Finally, resource the pivotal node: staff ODCs with MILCON-fluent, bilingual officers, so that they operate as credibility transmitters rather than chokepoints.</p><p>The mechanisms identified here—constitutive legality, politicisation cascades, and credibility transmission—through ODCs are generalisable and apply to other alliance infrastructure programs as well as to civilian multinational projects. They concern how legal instruments shape interorganisational networks, not solely the defence domain.</p><p>The findings also have clear policy applications for DoD/EUCOM/USAFE. In particular, the detected importance of DCA/IAs suggests that sequencing is critical and that they should be treated as gating resources; as such, ideally an upfront planning window should be built to finalise them, and require bilingual deliverables and meeting discipline. For the US embassies/ODCs, create dedicated MILCON liaison billets and a bilingual document suite to transmit credibility, and embed predictable escalation inside the agreements. For host-nation ministries, use LRDPs and routine steering committees with published agendas and minutes to keep cross-boundary decisions predictable. Future theaters (e.g. the Indo-Pacific) should port these lessons and map legal-environmental responsibilities via LRDPs before accelerating design.</p></sec></body><back><sec id="S8" sec-type="financial-disclosure"><title>Funding</title><p>This research received no external funding.</p></sec><sec id="S9"><title>Author Contributions</title><p>Conceptualization, B.P.; methodology, B.P.; formal analysis, B.P.; writing – original draft preparation, B.P.; writing – review and editing, B.P.; visualization, B.P.; supervision; B.P.; project administration, B.P.; validation, C.K.; investigation, C.K.; data curation, C.K.; writing – review and editing, C.K.</p></sec><sec id="S10"><title>Data Availability Statement</title><p>The data presented in this study is available on request from the corresponding author.</p></sec><sec id="S11" sec-type="COI-statement"><title>Disclosure Statement</title><p>No potential conflict of interest was reported by the authors. The authors read and agreed to the published version of the manuscript.</p></sec><sec id="S12"><title>AI Use Disclosure</title><p>The authors used OpenAI’s ChatGPT (model: GPT-5 Thinking) to assist with language editing, structural reorganisation, and reference formatting. The authors reviewed and verified all content and are solely responsible for the analysis, interpretations, and conclusions. No AI was used to generate or alter data, images, or figures.</p></sec><ack><title>Acknowledgements</title><p>The authors are grateful to the EDI professionals for participating in the study and sharing their experiences in the MILCON program.</p></ack><fn-group><fn id="fn1"><label>1</label><p>Foreign Military Sales.</p></fn><fn id="fn2"><label>2</label><p>To preserve non-attribution, direct quotations from interviewees are minimised; here the quotation is derived from official correspondence and retained verbatim as a documentary evidence.</p></fn></fn-group><ref-list><ref id="ref1"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Abbott</surname>, <given-names>K.W</given-names></string-name>. and <string-name><surname>Snidal</surname>, <given-names>D</given-names></string-name></person-group>. (<year>2000</year>) ‘<article-title>Hard and soft law in international governance’</article-title>, <source><italic>International Organization</italic></source>, <volume>54</volume>(<issue>3</issue>), pp. <fpage>421</fpage>-<lpage>456</lpage>. doi: <pub-id pub-id-type="doi">10.1162/002081800551280</pub-id>.</mixed-citation></ref><ref id="ref2"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Fearon</surname>, <given-names>J.D</given-names></string-name></person-group>. (<year>1997</year>) ‘<article-title>Signaling foreign policy interests: Tying hands versus sinking costs’</article-title>, <source><italic>Journal of Conflict Resolution</italic></source>, <volume>41</volume>(<issue>1</issue>), pp. <fpage>68</fpage>–<lpage>90</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0022002797041001004</pub-id>.</mixed-citation></ref><ref id="ref3"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hafner-Burton</surname>, <given-names>E.M</given-names></string-name>., <string-name><surname>Kahler</surname>, <given-names>M</given-names></string-name>. and <string-name><surname>Montgomery</surname>, <given-names>A.H</given-names></string-name></person-group>. (<year>2009</year>) ‘<article-title>Network analysis for international relations’</article-title>, <source><italic>International Organization</italic></source>, <volume>63</volume>(<issue>3</issue>), pp. <fpage>559</fpage>–<lpage>592</lpage>. doi: <pub-id pub-id-type="doi">10.1017/S0020818309090195</pub-id>.</mixed-citation></ref><ref id="ref4"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Hillman</surname>, <given-names>A.J</given-names></string-name>., <string-name><surname>Withers</surname>, <given-names>M.C</given-names></string-name>. and <string-name><surname>Collins</surname>, <given-names>B.J</given-names></string-name></person-group>. (<year>2009</year>) <article-title>‘Resource dependence theory: A review’</article-title>, <source><italic>Journal of Management</italic></source>, <volume>35</volume>(<issue>6</issue>), pp. <fpage>1404</fpage>–<lpage>1427</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0149206309343469</pub-id>.</mixed-citation></ref><ref id="ref5"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Ingold</surname>, <given-names>K</given-names></string-name>. and <string-name><surname>Leifeld</surname>, <given-names>P</given-names></string-name></person-group>. (<year>2016</year>) ‘<article-title>Structural and institutional determinants of influence reputation: A comparison of collaborative and adversarial policy networks in decision making and implementation’</article-title>, <source><italic>Journal of Public Administration Research and Theory</italic></source>, <volume>26</volume>(<issue>1</issue>), pp. <fpage>1</fpage>–<lpage>18</lpage>. doi: <pub-id pub-id-type="doi">10.1093/jopart/muu043</pub-id>.</mixed-citation></ref><ref id="ref6"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Johnson</surname>, <given-names>B</given-names></string-name></person-group>. (<year>1995</year>) <chapter-title><italic>Resource dependence theory: A political economy model of organizations</italic> (ERIC document ED387871)</chapter-title>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>Education Resources Information Center (ERIC), Institute of Education Sciences (IES), US Department of Education</publisher-name>. Available at: <ext-link ext-link-type="uri" xlink:href="https://eric.ed.gov/?id=ED387871">https://eric.ed.gov/?id=ED387871</ext-link> (Accessed 12 December 2025).</mixed-citation></ref><ref id="ref7"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kinne</surname>, <given-names>B.J</given-names></string-name></person-group>. (<year>2013</year>) <article-title>‘Network dynamics and the evolution of international cooperation’</article-title>, <source><italic>American Political Science Review</italic></source>, <volume>107</volume>(<issue>4</issue>), pp. <fpage>766</fpage>–<lpage>785</lpage>. doi: <pub-id pub-id-type="doi">10.1017/S0003055413000440</pub-id>.</mixed-citation></ref><ref id="ref8"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Kinne</surname>, <given-names>B.J</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘The defense cooperation agreement dataset (DCAD)’</article-title>, <source><italic>Journal of Conflict Resolution</italic></source>, <volume>64</volume>(<issue>4</issue>), pp. <fpage>729</fpage>–<lpage>755</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0022002719857796</pub-id>.</mixed-citation></ref><ref id="ref9"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Leeds</surname>, <given-names>B.A</given-names></string-name>., <string-name><surname>Long</surname>, <given-names>A.G</given-names></string-name>. and <string-name><surname>Mitchell</surname>, <given-names>S.M</given-names></string-name></person-group>. (<year>2000</year>) <article-title>‘Reevaluating alliance reliability: Specific threats, specific promises’</article-title>, <source><italic>Journal of Conflict Resolution</italic></source>, <volume>44</volume>(<issue>5</issue>), pp. <fpage>686</fpage>–<lpage>699</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0022002700044005006</pub-id>.</mixed-citation></ref><ref id="ref10"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Miles</surname>, <given-names>M.B</given-names></string-name>., <string-name><surname>Huberman</surname>, <given-names>A.M</given-names></string-name>. and <string-name><surname>Saldaña</surname>, <given-names>J</given-names></string-name></person-group>. (<year>2020</year>) <chapter-title><italic>Qualitative data analysis</italic>: <italic>A methods sourcebook</italic></chapter-title>, <edition>4th edn</edition>. <publisher-loc>Thousand Oaks, CA</publisher-loc>: <publisher-name>SAGE</publisher-name>.</mixed-citation></ref><ref id="ref11"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Moliterno</surname>, <given-names>T.P</given-names></string-name>. and <string-name><surname>Mahony</surname>, <given-names>D.M</given-names></string-name></person-group>. (<year>2011</year>) <article-title>‘Network theory of organization: A multilevel approach’</article-title>, <source><italic>Journal of Management</italic></source>, <volume>37</volume>(<issue>2</issue>), pp. <fpage>443</fpage>–<lpage>467</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0149206310371692</pub-id>.</mixed-citation></ref><ref id="ref12"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Morrow</surname>, <given-names>J.D</given-names></string-name></person-group>. (<year>1994</year>) <article-title>‘Alliances, credibility, and peacetime costs’</article-title>, <source><italic>Journal of Conflict Resolution</italic></source>, <volume>38</volume>(<issue>2</issue>), pp. <fpage>270</fpage>–<lpage>297</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0022002794038002004</pub-id>.</mixed-citation></ref><ref id="ref13"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Nienhüser</surname>, <given-names>W</given-names></string-name></person-group>. (<year>2008</year>) <article-title>‘Resource dependence theory–How well does it explain behavior of organizations?’</article-title>, <source><italic>Management Revue</italic></source>, <volume>19</volume>(1/2), pp. <fpage>9</fpage>–<lpage>32</lpage>. doi: <pub-id pub-id-type="doi">10.5771/0935-9915-2008-1-2-9</pub-id>.</mixed-citation></ref><ref id="ref14"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Pfeffer</surname>, <given-names>J</given-names></string-name>. and <string-name><surname>Salancik</surname>, <given-names>G.R</given-names></string-name></person-group>. (<year>1978</year>) <chapter-title><italic>The external control of organizations</italic>: <italic>A resource dependence perspective</italic></chapter-title>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Harper &amp; Row</publisher-name>.</mixed-citation></ref><ref id="ref15"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Podolny</surname>, <given-names>J.M</given-names></string-name>. and <string-name><surname>Page</surname>, <given-names>K.L</given-names></string-name></person-group>. (<year>1998</year>) <article-title>‘Network forms of organization’</article-title>, <source><italic>Annual Review of Sociology</italic></source>, <volume>24</volume>, pp. <fpage>57</fpage>–<lpage>76</lpage>. doi: <pub-id pub-id-type="doi">10.1146/annurev.soc.24.1.57</pub-id>.</mixed-citation></ref><ref id="ref16"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Putnam</surname>, <given-names>R.D</given-names></string-name></person-group>. (<year>1988</year>) <article-title>‘Diplomacy and domestic politics: The logic of two-level games’</article-title>, <source><italic>International Organization</italic></source>, <volume>42</volume>(<issue>3</issue>), pp. <fpage>427</fpage>–<lpage>460</lpage>. doi: <pub-id pub-id-type="doi">10.1017/S0020818300027697</pub-id>.</mixed-citation></ref><ref id="ref17"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Rapport</surname>, <given-names>A</given-names></string-name>. and <string-name><surname>Rathbun</surname>, <given-names>B</given-names></string-name></person-group>. (<year>2021</year>) <article-title>‘Parties to an alliance: Ideology and the domestic politics of international institutionalization’</article-title>, <source><italic>Journal of Peace Research</italic></source>, <volume>58</volume>(<issue>2</issue>): <fpage>279</fpage>–<lpage>293</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0022343319900916</pub-id>.</mixed-citation></ref><ref id="ref18"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Raustiala</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2000</year>) <article-title>‘Compliance &amp; effectiveness in international regulatory cooperation’</article-title>, <source><italic>Case Western Reserve Journal of International Law</italic></source>, <volume>32</volume>(<issue>3</issue>), pp. <fpage>387</fpage>–<lpage>440</lpage>. Available at: <ext-link ext-link-type="uri" xlink:href="https://scholarlycommons.law.case.edu/jil/vol32/iss3/2">https://scholarlycommons.law.case.edu/jil/vol32/iss3/2</ext-link> (Accessed 12 December 2025).</mixed-citation></ref><ref id="ref19"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Raustiala</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2002</year>) <article-title>‘The architecture of international cooperation: Transgovernmental networks and the future of international law’</article-title>, <source><italic>Virginia Journal of International Law</italic></source>, <volume>43</volume>(<issue>1</issue>), pp. <fpage>1</fpage>–<lpage>92</lpage>. doi: <pub-id pub-id-type="doi">10.2139/ssrn.333381</pub-id>.</mixed-citation></ref><ref id="ref20"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Raustiala</surname>, <given-names>K</given-names></string-name></person-group>. (<year>2005</year>) <article-title>‘Form and substance in international agreements’</article-title>, <source><italic>American Journal of International Law</italic></source>, <volume>99</volume>(<issue>3</issue>), pp. <fpage>581</fpage>–<lpage>614</lpage>. doi: <pub-id pub-id-type="doi">10.2307/1602292</pub-id>.</mixed-citation></ref><ref id="ref21"><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><surname>Salancik</surname>, <given-names>G.R</given-names></string-name></person-group>. (<year>1995</year>) <article-title>‘WANTED: A good network theory of organization’</article-title>, <source><italic>Administrative Science Quarterly</italic></source>, <volume>40</volume>(<issue>2</issue>), pp. <fpage>345</fpage>–<lpage>349</lpage>. doi: <pub-id pub-id-type="doi">10.2307/2393642</pub-id>.</mixed-citation></ref><ref id="ref22"><mixed-citation publication-type="web"><person-group person-group-type="author"><string-name><surname>Sirotnikova</surname>, <given-names>M</given-names></string-name></person-group>. (<year>2020</year>) <article-title>‘Businessman acquitted in murder of Jan Kuciak’</article-title>, <source><italic>The New York Times</italic></source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://www.nytimes.com/2020/09/03/world/europe/slovakia-murder-trial-acquittal.html">https://www.nytimes.com/2020/09/03/world/europe/slovakia-murder-trial-acquittal.html</ext-link> (Accessed: 01 July 2025).</mixed-citation></ref><ref id="ref23"><mixed-citation publication-type="book"><person-group person-group-type="author"><string-name><surname>Snyder</surname>, <given-names>G.H</given-names></string-name></person-group>. (<year>1997</year>) <chapter-title><italic>Alliance politics</italic></chapter-title>. <publisher-loc>Ithaca, NY</publisher-loc>: <publisher-name>Cornell University Press</publisher-name>.</mixed-citation></ref><ref id="ref24"><mixed-citation publication-type="web"><person-group person-group-type="author"><collab>Spectator Staff</collab></person-group> (<year>2019</year>) <article-title>‘The Defence Ministry ends talks on US investment in airports’</article-title>, <source><italic>The Slovak Spectator</italic></source>. Available at: <ext-link ext-link-type="uri" xlink:href="https://spectator.sme.sk/politics-and-society/c/the-defence-ministry-ends-talks-on-us-investment-in-airports">https://spectator.sme.sk/politics-and-society/c/the-defence-ministry-ends-talks-on-us-investment-in-airports</ext-link> (Accessed 03 September 2025).</mixed-citation></ref></ref-list><app-group><app id="app1"><title>Appendix A. Interview protocol</title><p><bold>Purpose</bold>. Elicit evidence on resources, flows, constraints, and leadership actions in EDI MILCON execution networks, and trace key decision episodes.</p><p><list list-type="order"><list-item><p>What was your job and what were your responsibilities?</p></list-item><list-item><p>Were you able to fulfill your responsibilities? Why or why not?</p></list-item><list-item><p>What resources did you need in place to execute successfully the USAF EDI MILCON program? Were those resources in place?</p></list-item><list-item><p>How would you characterise the flow of information and resources throughout the execution team?</p></list-item><list-item><p>What constraints did you encounter and how did you, the execution team, or other individuals, adapt to those constraints?</p></list-item><list-item><p>What could have occurred differently?</p></list-item></list></p></app><app id="app2"><title>Appendix B. Respondent index</title><p><list list-type="order"><list-item><p><bold>Operational level: Slovakia (SK) AFCEC PM 1</bold>. Initial project manager (PM) responsible for providing support to the programming activities, and for leading the design and construction stage for the USAF.</p></list-item><list-item><p><bold>Operational level: SK AFCEC PM 2</bold>. Second project manager (PM) responsible for providing support to the programming activities, and for leading the design and construction stage for the USAF.</p></list-item><list-item><p><bold>Operational level: SK AFCEC PM 3</bold>. Third project manager (PM) responsible for providing support to the programming activities, and for leading the design and construction stage for the USAF.</p></list-item><list-item><p><bold>Operational level: AFCEC supervisor</bold>. Supervisor for all AFCEC EDI project managers, providing consolidated project information to senior leadership and guidance for the execution of the entire USAF EDI MILCON program in the design/construction phase.</p></list-item><list-item><p><bold>Operational level: EUCOM Program Manager (PgM)</bold>. Obtain and consolidate program information and updates from each service component (USAF, US army [USA], US navy [USN]), and provide to leadership and oversight committees.</p></list-item><list-item><p><bold>Operational level: Poland (PL)/SK USAFE PgM</bold>. Planning and programming lead for the USAF responsible for leading the interorganisational team to establish fundamental requirements for scope and budget; interviewee managed both Polish and Slovakian programs.</p></list-item><list-item><p><bold>Operational level: PL/SK USAFE PgM</bold>. Planning and programming lead for the USAF responsible for leading the interorganisational team to establish fundamental requirements for scope and budget; interviewee managed both Polish and Slovakian programs.</p></list-item><list-item><p><bold>Strategic level: USAFE Supervisor</bold>. Supervisor for all USAFE planning and programming PgMs; responsible for consolidating and reporting USAFE program status for the entire USAF EDI program to leadership and EUCOM.</p></list-item><list-item><p><bold>Operational level: PL ODC</bold>. Mid-level defence liaison to the US Embassy responsible for coordinating diplomatic issues with the appropriate HN or Embassy staff. Issues can include country clearance requests for authorisation to enter the country on official business, to facilitating resolution of design/construction issues on a project with the HN.</p></list-item><list-item><p><bold>Operational Level: SK ODC</bold>. Mid-level defence liaison to the US Embassy responsible for coordinating diplomatic issues with the appropriate HN or Embassy staff. Issues can include country clearance requests for authorisation to enter the country on official business, to facilitating resolution of design/construction issues on a project with the HN.</p></list-item></list></p></app></app-group></back></article>
