• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » data privacy » Fitness Tracker Accidentally Reveals Sensitive Military Positions

Fitness Tracker Accidentally Reveals Sensitive Military Positions

2018-01-29 by Michelle Dvorak

Fitness Tracker Strava Accidentally Reveals Sensitive Military Positions

A fitness tracker app reveals the locations of military personnel on a heat map used by the app to show how widely used it is. This security risk was reported by The Guardian. Fitness Tracker Strava logs the route of every workout path taken by users while exercising. This includes biking, cycling, walking, running, swimming sessions. It also logs the location of workout that occurs inside a building, even when it is a military facility!

US OPSEC (Operations Security) concurs that Strava does indeed show classified military installations on its user heat map. However, the fitness tracker is also mapping inside sensitive military outposts when the users are service personnel stationed in the US and overseas.

The data is uploaded by any user who leaves to default security settings in place while exercising. In order to not share a location on the map, users must disable that function. Not only is aggregate workout data uploaded but individual users are identifiable too.

Robert Joyce, President Trump’s Cybersecurity Coordinator of the National Security Council, stated “it’s really clear that that heat map is a security risk,” and it is expected that service members’ use of Strava and other fitness trackers would be restricted while on active duty.

Map apps like Google and Bing maps don’t display details of known military installations. The reveled installations include US military installations as well as those of other nations. The map revels the workout patterns of personnel using the app to monitor their progress.

According to Strava’s website:
Strava is more than just a fitness tracker, it is a social media channel as well. This the public sharing of workouts. The company’s about us page states that, “Strava is the social network for athletes. We’re a global community of millions of runners, cyclists and triathletes, united by the camaraderie of sport. Our website and mobile apps bring athletes together from all walks of life and inspire them to unlock their potential”

More Security Risks

Strava also has a feature known as Beacon. This feature allows users to share their real-time location with up to three contacts. Although this feature is good for loved ones by giving them peace of mind that you are okay and still moving, it does present another security concern.

Sites like Facebook are a favorite for social engineering attacks. Strava identifies itself as a social media channel for athletes. If a hacker can get a hold of your hometown based on the app, some more personal information from another social channel, they have a lot on you to being having your financial records. Add your real-time location, and you leave your home open to a real-time break in!

The heat map can be viewed on Strava’s website

Filed Under: data privacy Tagged With: wearable

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version