Ex-General Warns of China’s Potential Exploitation of F-35 Technology Through Intelligence Channels
WASHINGTON — November 22, 2025 — A former U.S. military general has expressed caution over the potential risks associated with sharing advanced F-35 fighter jet technology with Saudi Arabia, emphasizing that while Saudi Arabia itself is unlikely to directly leak the sensitive technology, China could still gain access through intelligence operations.
The comments come amid ongoing discussions about possible military sales of the F-35 stealth fighter to Saudi Arabia, a move that has sparked debate among defense analysts and policymakers about the implications for U.S. national security and regional stability.
According to the former general, China’s well-documented history of cyber espionage and intelligence gathering targeting U.S. military technology remains a significant concern. “China has repeatedly demonstrated its capability and willingness to acquire sensitive defense technologies through covert means,” the official said, speaking on condition of anonymity.
The F-35 Lightning II, developed by Lockheed Martin, is among the most advanced multirole stealth fighters in the world, incorporating cutting-edge avionics, stealth capabilities, and integrated sensor systems. Its technology is considered highly sensitive, and the U.S. government has historically restricted its distribution to close allies.
Saudi Arabia’s potential acquisition of the F-35 has been under consideration for several years, driven by the kingdom’s desire to modernize its air force amid regional tensions. However, concerns persist regarding the kingdom’s security infrastructure and the risk that the technology could be compromised.
The former general noted that while Saudi Arabia’s military and intelligence services are unlikely to intentionally leak the F-35 technology, the interconnected nature of global intelligence networks means that China could exploit vulnerabilities indirectly. This could include cyber intrusions, human intelligence operations, or exploiting third-party intermediaries.
“The risk is not necessarily from the recipient country itself but from adversaries who seek to penetrate the supply chain or intelligence environment surrounding these transfers,” the official explained.
U.S. defense officials have acknowledged the challenges in balancing strategic partnerships with the imperative to safeguard sensitive technologies. The F-35 program includes stringent security protocols, including hardware and software protections, to mitigate risks of unauthorized access.
However, experts warn that no system is entirely impervious to espionage, particularly given China’s persistent efforts to acquire advanced military capabilities through a combination of cyberattacks, intellectual property theft, and human intelligence.
The debate over Saudi Arabia’s F-35 acquisition also intersects with broader geopolitical considerations, including U.S. relations with Gulf allies, countering Iranian influence, and managing China’s expanding global footprint.
Analysts note that the decision to sell F-35s to Saudi Arabia involves weighing the benefits of strengthening an important regional partner against the potential risks of technology leakage and escalation of regional arms competition.
As of now, no formal agreement has been finalized, and U.S. officials continue to evaluate the security implications carefully. The Pentagon and intelligence agencies remain vigilant in monitoring any attempts by foreign actors to access or reverse-engineer F-35 technology.
The former general’s remarks underscore the complexity of modern defense technology transfers, where the threat landscape extends beyond direct recipients to include sophisticated intelligence adversaries capable of exploiting indirect channels.
The situation highlights the ongoing challenge for the U.S. and its allies in protecting critical military technologies while maintaining strategic partnerships in an increasingly contested global environment.

Leave a Reply