US Military Bans Fitness Trackers, Citing Spy Risk
The US Department of Defense (DoD) has banned military staff from using geolocation tools such as GPS-enabled fitness trackers in "operational areas." The move follows fears such data could be unintentionally public and threaten security.
Earlier this year fitness tracker company Strava published a worldwide map showing the most popular routes for its users to run and carry out other exercise activity. The map showed routes in increasing levels of brightness depending on their popularity.
Middle East Bases Unintentionally Mapped
Several users then spotted several routes in countries such as Afghanistan and Syria. Given those aren't exactly leading markets for Strava, it wasn't hard to figure out the locations in questions were US military bases. While some of the routes were likely soldiers running recreationally, others appeared to have been heavily used because they were where soldiers were patrolling a base.
The maps presented a couple of possible security risks. One was that even where it was known that a particular location was a military base, the routes could reveal details about the arrangements of buildings inside the base. Another was that enemies could spot popular routes around the base where soldiers would run.
Pentagon Has Own Phone Rules
The DoD launched a review which has now led to the ban on geolocation tools. The ban is specifically worded to cover geolocation features rather than name specific devices, meaning it won't become outdated. Local commanders will have the authority to decide what devices can and can't be used. (Source: defenseone.com)
The Pentagon will be excluded from the ban, despite technically being an operation area. However, the facility already has tech security rules that mean staff must put phones in a special storage unit outside the main Pentagon building whenever discussing classified or sensitive issues. That's designed to combat the risks of phones being remotely hijacked to use the microphone or camera to record and relay sound and video. (Source: bbc.co.uk)
What's Your Opinion?
Is the military right to issue the ban? Should the DoD have the power to force geolocation companies to disable tracking in specific regions? Should the military ban personal mobile devices and app installations completely for staff on deployment?
Most popular articles
- Which Processor is Better: Intel or AMD? - Explained
- How to Prevent Ransomware in 2018 - 10 Steps
- 5 Best Anti Ransomware Software Free
- How to Fix: Computer / Network Infected with Ransomware (10 Steps)
- How to Fix: Your Computer is Infected, Call This Number (Scam)
- Scammed by Informatico Experts? Here's What to Do
- Scammed by Smart PC Experts? Here's What to Do
- Scammed by Right PC Experts? Here's What to Do
- Scammed by PC / Web Network Experts? Here's What to Do
- How to Fix: Windows Update Won't Update
- Explained: Do I need a VPN? Are VPNs Safe for Online Banking?
- Explained: VPN vs Proxy; What's the Difference?
- Explained: Difference Between VPN Server and VPN (Service)
- Forgot Password? How to: Reset Any Password: Windows Vista, 7, 8, 10
- How to: Use a Firewall to Block Full Screen Ads on Android
- Explained: Absolute Best way to Limit Data on Android
- Explained: Difference Between Dark Web, Deep Net, Darknet and More
- Explained: If I Reset Windows 10 will it Remove Malware?
My name is Dennis Faas and I am a senior systems administrator and IT technical analyst specializing in cyber crimes (sextortion / blackmail / tech support scams) with over 30 years experience; I also run this website! If you need technical assistance , I can help. Click here to email me now; optionally, you can review my resume here. You can also read how I can fix your computer over the Internet (also includes user reviews).
We are BBB Accredited
We are BBB accredited (A+ rating), celebrating 21 years of excellence! Click to view our rating on the BBB.
Comments
The Internet of Things (IOT)
This should not come as a surprise when it comes to the Internet of Things, intelligence, and espionage. Any device that has a CPU and connects to the Internet has the potential to be hacked or exploited in order to track or spy on you. The same thing can be said about the Amazon Echo and Google Home, or even a smartphone or tablet. They all come equipped with a microphone and smartphones and tablets have cameras. While these devices are incredibly convenient, there is a trade off when it comes to privacy and the potential for these devices to turn rogue due to exploits or remote hacking.