Chinese AI Firms Market Intelligence on U.S. Troops During Iran War, Exposing a New Vulnerability for American Forces


April 4, 2026, 11 a.m.

Views: 1116


imrs

Chinese AI Firms Market Intelligence on U.S. Troops During Iran War, Exposing a New Vulnerability for American Forces

A troubling new front in strategic competition is coming into view, and it is not unfolding only in government ministries or on conventional battlefields. It is emerging through private Chinese technology firms that are openly advertising their ability to track, analyze, and “expose” the movements of U.S. military forces during an active conflict. According to a report describing the rise of this sector, Chinese companies have been using artificial intelligence, satellite imagery, flight-tracking feeds, shipping data, and other open-source inputs to market detailed intelligence products focused on American military activity in the Middle East during the Iran war. Some of these firms reportedly have links to China’s military-industrial ecosystem, while Beijing publicly seeks to distance itself from direct involvement in the conflict.

That combination should alarm Americans. It suggests that China is benefiting from a dual-track model in which the state preserves plausible deniability while private firms gather, process, and publicize sensitive intelligence about U.S. deployments. Even if every advertised capability is not yet as powerful as claimed, the direction is unmistakable. China’s technology ecosystem is moving toward a point where commercial AI tools, geospatial analysis, and military relevance are becoming deeply intertwined. The question is no longer whether such firms exist. The question is how much advantage they may already be giving to America’s adversaries and how exposed U.S. forces may be in future crises.

The report describes how, as the war in Iran erupted, viral posts across Chinese and Western social platforms began detailing equipment at U.S. bases, the movements of American carrier groups, and highly granular assessments of how military aircraft were assembling ahead of strikes on Tehran. The intelligence was said to come from a fast-growing market of Chinese firms that combine AI with open-source data to generate products claiming to reveal the locations and movements of U.S. forces. One firm, MizarVision, is described as using Western and Chinese data filtered through AI to catalog activity at U.S. bases in the Middle East, track naval movements, and identify aircraft and missile defense systems. The firm reportedly posted analyses of the buildup of U.S. forces before Operation Epic Fury, including the movements of the USS Gerald R. Ford and USS Abraham Lincoln carrier strike groups, and the concentration of aircraft at specific regional bases.

This matters for a very simple reason. The American military has long depended on the ability to control information about its operations. That does not mean hiding every aircraft movement or every ship transit from public view. In the modern era, some visibility is unavoidable. But there is a major difference between scattered open-source clues and AI-enhanced, commercialized systems designed specifically to assemble those clues into an operational picture of U.S. force posture. Once that aggregation becomes fast, cheap, and scalable, the danger changes. A hostile state or partner force no longer needs to rely solely on its own traditional intelligence networks. It can benefit from a private-sector ecosystem that does much of the collection and interpretation in public view.

The report notes that Beijing has invested hundreds of millions of dollars in private companies developing AI with practical defense applications under its civil-military integration strategy, and that China recently announced plans to accelerate those efforts as part of a broader five-year national strategy. That means these firms should not be seen as isolated start-ups acting in a vacuum. They are part of a larger policy environment in which China encourages the fusion of private innovation and military utility. A company may not wear a uniform, but if it is certified to supply services to the People’s Liberation Army or is strategically aligned with China’s defense priorities, then its commercial status should not reassure anyone. It should raise more questions.

One of the most striking details in the report is that MizarVision holds a National Military Standard certification required for firms supplying services to the PLA. That does not automatically prove the company is operating directly on behalf of Chinese military intelligence in every instance, but it does show that it exists within an ecosystem structured for military relevance. Another Hangzhou-based firm, Jing’an Technology, reportedly claimed to have recorded communications between two U.S. B-2A stealth bombers during the opening salvos of Operation Epic Fury and boasted online that “in the eyes of AI, there is no absolute ‘stealth.’” U.S. officials and analysts quoted in the report expressed skepticism that Chinese firms could truly penetrate U.S. stealth communications, yet they also made clear that the broader trend is dangerous regardless. Even if some of the firms’ public claims are exaggerated, the intent behind them is unmistakable: to demonstrate that Chinese technology can monitor, interpret, and potentially support operations against American forces.

That intent is what Americans should pay attention to. Too often, public discussion of national security waits for a perfect smoking gun. But rival states do not operate that way. They probe, test, signal, and build capacity incrementally. A private Chinese firm does not need to prove it can see everything in real time to be useful. It only needs to improve the efficiency with which open-source fragments are turned into militarily relevant knowledge. If such tools help identify carrier refueling patterns, map aircraft concentrations, detect missile-defense deployments, or reveal patterns in logistics traffic, then they have already crossed into a zone of strategic significance.

There is also a geopolitical dimension that makes this more serious than an ordinary technology story. The report points out that analysts believe firms like MizarVision and Jing’an may give Beijing a plausible way to aid partners while maintaining official distance from conflicts. That is a powerful model for a state like China, which often seeks to project influence without assuming overt responsibility. In this case, China can publicly posture as a peacemaker while companies operating under its broader strategic umbrella advertise their ability to reveal U.S. force movements in a war zone involving one of Beijing’s longtime partners. That is not neutrality in any meaningful sense. It is strategic ambiguity used as cover for asymmetric advantage.

Americans should also understand the asymmetry built into this model. U.S. companies certainly use open-source intelligence and satellite imagery. But the report highlights a key difference: these Chinese firms are marketing products focused specifically on tracking the American military. One source quoted in the report said that using AI to analyze publicly available Western satellite imagery is not unusual on its own, but using it in a way so specifically aimed at the U.S. military is not typical for Western firms. That distinction matters. It suggests that what is being built is not merely a commercial analytics business but a targeted surveillance capability tuned to the operational profile of the United States.

Some may argue that because these firms rely at least partly on open-source data, the United States should simply accept this as the cost of operating in a transparent digital age. That view is too passive. Open-source information has always existed in some form, but AI dramatically changes the scale and speed at which disparate data can be fused into a coherent military picture. A rival that can automate the parsing of ship AIS data, ADS-B flight tracks, commercial satellite imagery, social media posts, and logistics indicators gains a meaningful edge, even without breaching classified systems. The vulnerability is not that one secret document leaked. The vulnerability is that the entire open information environment can now be weaponized at industrial scale.

This trend also exposes a policy gap in how Americans think about commercial technology. It is no longer enough to ask whether a company is directly controlled by a foreign military. The more relevant question may be whether its products, certifications, customers, and strategic purpose effectively serve that military’s interests. The old division between civilian and military sectors is increasingly blurred in China, especially under the doctrine of civil-military integration. That means Washington cannot treat Chinese AI and geospatial firms as neutral commercial actors by default, especially when they openly boast about exposing U.S. military operations during wartime.

The House Select Committee on China put the issue starkly, saying that companies tied to the CCP are turning AI into a battlefield surveillance tool against America and warning that the threat from China’s technology ecosystem is “imminent.” That language is forceful, but the facts described in the report explain why lawmakers are using it. Americans are not looking at a hypothetical future in which Chinese firms might one day try to map U.S. forces. They are looking at companies that already claim to have done so, already publicize such work, and already operate in an ecosystem designed to support Chinese strategic objectives.

None of this means panic is the right response. But complacency would be far worse. The United States needs to assume that future military concealment will be harder, that commercial data markets can be exploited by adversaries, and that AI will continue to lower the barrier for transforming public information into operational intelligence. That requires tighter controls on sensitive commercial data, stronger scrutiny of foreign access to imagery and tracking services, clearer rules for U.S. firms whose products could be repurposed by hostile actors, and a more realistic doctrine for operating under constant digital observation. The old assumption that secrecy ends where classification ends is no longer sufficient.

The deeper lesson is this: China does not need to send uniformed officers into every theater to complicate U.S. operations. It can rely on an expanding private technology ecosystem, fed by state support and aligned with state priorities, to create surveillance pressure on American forces while preserving formal distance. That is a smarter, cheaper, and politically safer model for Beijing than overt intervention. And it is precisely why Americans should be vigilant. What looks like a private AI company selling analytics may, in practice, be part of a much broader effort to make the American military more visible, more predictable, and more vulnerable in crisis.


Return to blog