Chinese Firm Tracks US Military Movements; Leaked Data Aided Iranian Strategy

February 24: Satellite pics show military aircraft at the Prince Sultan Air Force Base, Saudi Arabia NEW DELHI: In late February, well befor...

February 24: Satellite pics show military aircraft at the Prince Sultan Air Force Base, Saudi Arabia

NEW DELHI: In late February, well before the first missiles were launched and the name 'Operation Epic Fury' became public, high-resolution satellite images began circulating quietly across the internet.

These images captured aircraft stationed on runways, transport planes arriving at remote desert airbases, and fighter-laden carriers positioned in the Mediterranean. Crucially, the data superimposed on these images was recorded with surgical precision—not in English, but in Mandarin. The files detailed aircraft models, missile defense systems, and troop concentrations, all accompanied by exact geolocations.

The leaks included visuals of Lockheed Martin F-22 stealth fighters at Israel’s Ovda Airbase, as well as military deployments at Prince Sultan Air Base in Saudi Arabia. Detailed maps of US bases in Qatar, Jordan, and Bahrain were also released. The source was a Chinese Artificial Intelligence (AI) firm with fewer than 200 employees.

Following these leaks, on February 28, the US and Israel launched 'Operation Epic Fury,' an aerial campaign targeting Iran. Tehran responded with a series of missile and drone strikes. Throughout the escalation, MizarVision, a Shanghai-based geospatial intelligence company, continued to publish real-time satellite imagery tracking US aircraft and missile defense movements.

Key Revelations from the Images

The first wave of images surfaced around February 20, documenting the arrival of US assets in Israel, regional deployments across the Middle East, and carrier movements in the Arabian Sea. These images were processed using advanced AI analysis tools.

By March 1, data regarding bases in Jordan, Kuwait, Bahrain, and the UAE began appearing on platforms like X (formerly Twitter) and Weibo. These posts were frequently amplified by accounts linked to Chinese state media.

Satellite imagery shows the USS Ford aircraft carrier departing Sounda Bay Naval Base

Tracking the Carrier Strike Groups

The company’s surveillance extended to maritime operations. MizarVision released precise coordinates for the USS Gerald R. Ford and USS Abraham Lincoln, including inventories of the aircraft on their decks. This was achieved by synthesizing commercial satellite imagery with live flight and maritime tracking data.

Unlike Western giants like Maxar or Planet Labs, MizarVision does not own its own satellite constellation. Instead, it operates as an 'information aggregator.' By leveraging AI to scrutinize commercial satellite feeds and signal data from ships and aircraft, the firm produces intelligence reports that rival those of state agencies.

Experts suggest the firm sources its imagery from China’s Jilin-1 satellite network or by purchasing high-resolution data from international commercial providers.


The Iranian Connection

While there is no official confirmation that Iran relied directly on MizarVision’s data, the correlation is striking. Several facilities highlighted by the firm—including the Al-Udeid Air Base in Qatar and the Muwaffaq Salti Air Base in Jordan—were subsequently targeted by Iranian strikes. In Jordan, the destruction of a US radar system valued at $300 million represented a significant blow to regional missile defense capabilities.

COMMENTS


*

Name

AROUND THE GLOBE,9754,business,76,BY READERS,480,FEATURE,308,GLOBE,17,KERALA,14,Movie,329,s,1,SPECIAL STORY,408,TAMILNADU,4,TOP STORY,10459,TRAVEL,8,
ltr
item
Local Glob: Chinese Firm Tracks US Military Movements; Leaked Data Aided Iranian Strategy
Chinese Firm Tracks US Military Movements; Leaked Data Aided Iranian Strategy
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdVkh_jMr7XR2xMnDgXGBRedeibr2tD0mKTUmb784N1ENVqEz7OVO1TtyQeklMUVIllUpqZiODLWTAG_wvXvkzriJKDh7FfR4t_tTJsP7U07vhOwhgAchrvWYm-yl9M-aU8S0aIdAavMS2Qt57P56923SFo3VZVDThsVC9KM9ntDGHu9yk78o3tnTh0edV/w640-h384/china1.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdVkh_jMr7XR2xMnDgXGBRedeibr2tD0mKTUmb784N1ENVqEz7OVO1TtyQeklMUVIllUpqZiODLWTAG_wvXvkzriJKDh7FfR4t_tTJsP7U07vhOwhgAchrvWYm-yl9M-aU8S0aIdAavMS2Qt57P56923SFo3VZVDThsVC9KM9ntDGHu9yk78o3tnTh0edV/s72-w640-c-h384/china1.jpg
Local Glob
https://www.localglob.com/2026/03/chinese-firm-tracks-us-military.html
https://www.localglob.com/
http://www.localglob.com/
http://www.localglob.com/2026/03/chinese-firm-tracks-us-military.html
true
8255692317570297677
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy