Pentagon Tells Personnel to Turn Off Geolocation in Sensitive Areas

In the wake of reports that fitness apps’ user data was exposed and could be used to identify military and intelligence personnel in sensitive areas like bases and deployment zones, U.S. military and defense employees can no longer use geolocation features in devices and apps in operational areas. The new policy was announced last Friday. Also see coverage at Stars and Stripes. [Gizmodo]

Previously: Strava Heat Map Reveals Soldiers’ LocationsNon-Anonymized Strava User Data Is AccessibleStrava, Responding to Security Concerns, Disables FeaturesPolar Flow User Data Can Be Used to Identify Military and Intelligence Personnel.

An Osprey Named Julie

It began with an osprey named Julie, who in 2015 migrated from the Detroit River in Michigan all the way to Maracaibo, Venezuela, stopping at wetlands and wildlife refuges along the way. Julie wore a GPS tracker. John Nelson took Julie’s data and created a series of maps of her journey that represent a brilliant use of negative space: aerial and satellite imagery is shown only along the paths she took; everything else is blanked out. It’s a linear map of a bird’s entire world. The Story Map goes into more detail; the accompanying text is frankly beautifully written. John explains how he made the maps here.

Polar Flow User Data Can Be Used to Identify Military and Intelligence Personnel

Remember how in January the mobile fitness app Strava was found to reveal the training routes and user data of military and security personnel? It wasn’t just Strava. A joint investigation by Bellingcat and De Correspondent found that the data for users of the Polar Flow app is even more exposed: even the names and home addresses of military and intelligence personnel working at embassies, bases, intelligence agencies and other sensitive locations could be figured out from the user data. De Correspondent shows how.

Polar, the Finnish company behind the app and service, announced that they were suspending the Explore feature that made the data accessible. They also note, and it’s worth remembering, that Polar data is private by default. If you’re military or intelligence and using a fitness app, what the hell are you doing exposing your location data—especially if you’re in a sensitive location?

The report also contains one hell of a buried lede. They tested other apps, namely Strava, Endomondo and Runkeeper, and, well: “Though it’s harder to identify people and find their home addresses than it is through Polar, we were ultimately able to do so using these apps. In contrast to Polar’s app, there is no indication that people whose profiles are set to private can also be identified in these apps. We informed them of our findings last week.” In other words, this is an industry-wide problem, not just a problem with one or two services. [The Verge]