Saturday, 31 January 2026

DOES CHINA KNOW EVERYTHING? Chinese accessed the private comms of at least 3 British Prime Minister s aides, US Pres elect in massive spy op

Yet another massive intelligence failure by MI6,CIA and Mossad has been exposed.

But why did China have a motive to undertake such massive surveillance of the British gov as well?

Look no further than D 15 218 and E 17 449 when Soros, Gates, Trump and Kushner were plottnig diease schemes like covid, censorship and other criminal schemes against China years before they happened

The Billionaires gave all their secrets away and do every day they fail to correct the perversions of justice and so keep the focus on them and their intentions.

On top of that, they entlangled themselves in so many crimes and violations, they have zero defence against first degree premeditated (mass) murder as part of the covid scheme.

Bets on the Chinese know everything, every personal, private and  national UK and US and European security secret, about King Charles, William, Soros, Rothschld, Gates, Trump, Bezos, Lauder, Bessent.

In this environment, it is crazy for the Billionaires and Trump to attack Iran backed by China, Chinese satellite data able to direct missiles 1000s of miles for high precision strikes or drone swarms, cyberattacks or asymmetric warfare.

From ZeroHedge

 The four trillion dollars in institutional capital positioned for stable UK-China relations rests on an assumption that died in a Chengdu server room sometime around 2019. The assumption is that espionage between major powers operates within understood boundaries, that telecommunications infrastructure is contested but not compromised, that the surveillance systems Western governments built to watch their citizens cannot be turned around to watch them. The assumption has been falsified. What follows is the complete mechanism of how China’s Ministry of State Security achieved persistent access to the private communications of three British Prime Ministers’ closest advisers, the phones of a US President-elect, and the wiretap systems that were supposed to catch them doing it. The positioning implications are immediate. The framework is permanent.

,,,,

The Crown Jewels: Three Prime Ministers’ Inner Circles Exposed

The targeting profile of Salt Typhoon reveals strategic intent far beyond conventional espionage.


In the United States, nine telecommunications carriers have been confirmed compromised: Verizon, AT&T, T-Mobile, Lumen Technologies, Spectrum (Charter Communications), Consolidated Communications, Windstream, Viasat, and at least one additional unnamed provider. Senator Mark Warner, chairman of the Senate Intelligence Committee, characterized it as the worst telecom hack in our nation’s history. The scope comparison is instructive. SolarWinds, the Russian supply chain compromise discovered in December 2020, affected approximately 18,000 organizations with deep penetration of roughly 100. Salt Typhoon compromised over 200 companies across 80 countries.


The data accessed falls into two categories with very different strategic implications.


The first category is bulk metadata: call detail records showing who contacted whom, when, and for how long, plus geolocation data derived from cell tower connections. Former Deputy National Security Advisor Anne Neuberger confirmed that attackers gained capabilities to geolocate millions of individuals. Metadata reveals patterns invisible in content alone. If a senior Treasury official calls a specific BP executive three times in one night before a North Sea oil announcement, Beijing knows the policy shift before the Cabinet does. Mapping communication networks reveals the actual decision-making structure of governments, which often differs substantially from organizational charts.


The second category is targeted content interception. Fewer than 100 individuals had actual call content and text messages directly compromised, but those individuals included Donald Trump, JD Vance, and senior staff from the Harris campaign during the 2024 presidential election. Congressional staff from the House China Committee, Foreign Affairs Committee, Armed Services Committee, and Intelligence Committee were accessed in breaches detected in December 2025, according to the Financial Times. The targeting was not random. It was surgical.


The United Kingdom penetration, disclosed by The Telegraph on January 26, 2026, reached right into the heart of Downing Street. The National Cyber Security Centre confirmed observing a cluster of activity targeting UK infrastructure since 2021. Aides to Prime Ministers Boris Johnson, Liz Truss, and Rishi Sunak had their communications compromised across a three-year period that included the COVID-19 pandemic response, the Ukraine war’s escalation, and critic


https://www.zerohedge.com/geopolitical/next-level-spying-how-china-read-wests-wiretaps-years

No comments:

Post a Comment