February 24: Satellite pics show military aircraft at the Prince Sultan Air Force Base, Saudi Arabia NEW DELHI: In late February, well befor...

February 24: Satellite pics show military aircraft at the Prince Sultan Air Force Base, Saudi Arabia
NEW DELHI: In late February, well before the first missiles were launched and the name 'Operation Epic Fury' became public, high-resolution satellite images began circulating quietly across the internet.
These images captured aircraft stationed on runways, transport planes arriving at remote desert airbases, and fighter-laden carriers positioned in the Mediterranean. Crucially, the data superimposed on these images was recorded with surgical precision—not in English, but in Mandarin. The files detailed aircraft models, missile defense systems, and troop concentrations, all accompanied by exact geolocations.
The leaks included visuals of Lockheed Martin F-22 stealth fighters at Israel’s Ovda Airbase, as well as military deployments at Prince Sultan Air Base in Saudi Arabia. Detailed maps of US bases in Qatar, Jordan, and Bahrain were also released. The source was a Chinese Artificial Intelligence (AI) firm with fewer than 200 employees.
Following these leaks, on February 28, the US and Israel launched 'Operation Epic Fury,' an aerial campaign targeting Iran. Tehran responded with a series of missile and drone strikes. Throughout the escalation, MizarVision, a Shanghai-based geospatial intelligence company, continued to publish real-time satellite imagery tracking US aircraft and missile defense movements.
Key Revelations from the Images
The first wave of images surfaced around February 20, documenting the arrival of US assets in Israel, regional deployments across the Middle East, and carrier movements in the Arabian Sea. These images were processed using advanced AI analysis tools.
By March 1, data regarding bases in Jordan, Kuwait, Bahrain, and the UAE began appearing on platforms like X (formerly Twitter) and Weibo. These posts were frequently amplified by accounts linked to Chinese state media.

Satellite imagery shows the USS Ford aircraft carrier departing Sounda Bay Naval Base
Tracking the Carrier Strike Groups
The company’s surveillance extended to maritime operations. MizarVision released precise coordinates for the USS Gerald R. Ford and USS Abraham Lincoln, including inventories of the aircraft on their decks. This was achieved by synthesizing commercial satellite imagery with live flight and maritime tracking data.
Unlike Western giants like Maxar or Planet Labs, MizarVision does not own its own satellite constellation. Instead, it operates as an 'information aggregator.' By leveraging AI to scrutinize commercial satellite feeds and signal data from ships and aircraft, the firm produces intelligence reports that rival those of state agencies.
Experts suggest the firm sources its imagery from China’s Jilin-1 satellite network or by purchasing high-resolution data from international commercial providers.
The Iranian Connection
While there is no official confirmation that Iran relied directly on MizarVision’s data, the correlation is striking. Several facilities highlighted by the firm—including the Al-Udeid Air Base in Qatar and the Muwaffaq Salti Air Base in Jordan—were subsequently targeted by Iranian strikes. In Jordan, the destruction of a US radar system valued at $300 million represented a significant blow to regional missile defense capabilities.

COMMENTS