LATEST
Corruption Files
Digital surveillance concept
Intelligence

Chinese Tech Firms Exposing U.S Military Secrets in the Iran Conflict

By

Aclassified U.S. intelligence alert, shared with allies on April 3 and seen by this outlet, warns that Chinese technology companies are systematically harvesting open-source data — including fitness tracker logs, social media geotags, and commercial satellite imagery — to expose covert U.S. military operations in the Iran conflict zone.

The alert, produced by the National Counterintelligence and Security Center (NCSC), names three Chinese firms — Shanghai-based Hesai Technology, Beijing-based MegaFon Analytics, and Shenzhen-based DeepMap — as 'high-confidence conduits' for information that has compromised at least two CIA field assets and revealed the locations of three U.S. special operations teams in Iraq since January.

The data collection method, known as 'OSINT fusion,' combines publicly available data with advanced pattern recognition. For example, fitness tracker data from U.S. personnel inadvertently left running during deployments can reveal patrol routes and base perimeters. Chinese firms then sell the analyzed data to Iranian intelligence, according to the alert.

Pentagon restricts personal devices

In response, the Department of Defense has expanded its ban on geolocation-enabled personal devices to all forward operating bases in CENTCOM's area of responsibility. Personnel found violating the ban face disciplinary action, including potential courts-martial.

The Chinese Ministry of Foreign Affairs denied the allegations, calling them 'baseless smears against innocent Chinese companies.' The companies named did not respond to requests for comment.

This is a new form of warfare. They're not hacking our systems — they're exploiting the data we leave lying around in plain sight. Every soldier needs to understand the threat.

— Gen. Michael Kurilla, CENTCOM Commander

The NCSC alert recommends that all U.S. personnel disable geolocation on personal devices, use VPNs when accessing any online account overseas, and avoid posting operational details — including vague references to 'work' — on social media.

Mirror Standard — Investigative Journalism
Naomi Vosburgh — author photo
About Author

Naomi spent seven years writing about national security before she started noticing how much of the story was being managed rather than reported. She has reviewed thousands of declassified documents, interviewed former intelligence officers, and developed a working knowledge of the specific ways that state secrecy is used not to protect national interests but to protect institutional ones. She approaches official denials the way a good mechanic approaches a strange noise — as a starting point, not a conclusion.

SubstackMedium

Related posts