Blog > When Fitness Trackers Exposed Military Secrets
David Herse | September 11, 2025
In January 2018, Australian researcher Nathan Ruser noticed something odd while browsing Strava’s new Global Heatmap. Jogging paths were glowing in the middle of the Syrian desert—right where U.S. and allied military bases were located.
The discovery quickly spread. Journalists confirmed that fitness tracker data was unintentionally exposing:
The U.S. Department of Defense soon launched a review, acknowledging that personal fitness data could endanger operations. Strava restricted some visibility settings in response.
The risk wasn’t a single jog—it was the aggregate movement patterns. Enough shared runs and rides could outline sensitive facilities or link work sites to residential addresses.
In 2024–25, French newspaper Le Monde revived the issue with its #StravaLeaks investigation. Reporters showed how publicly available Strava activities exposed:
The series underscored that even after earlier scandals, fitness app data was still leaking high-value intelligence.
This is a classic case of open-source intelligence (OSINT): everyday consumer data becoming a national security vulnerability. It shows how:
As one U.S. official put it at the time, fitness apps were “the new geotagged photo”—a modern data exhaust that adversaries could exploit.
The Strava incidents highlight a fundamental challenge in our connected world: consumer technology generates intelligence-grade data. What starts as personal fitness tracking becomes, at scale, a global surveillance network.
The implications are clear:
The lessons apply beyond military contexts:
For those of us working with location data, the Strava story is both a cautionary tale and a demonstration of power. Location data reveals truth—sometimes uncomfortable truth—about how we live and work.
Location intelligence platforms can:
But they also require:
Australian businesses and government agencies face unique challenges:
Years after the initial Strava revelations, the same vulnerabilities persist. New platforms emerge, each collecting location data in novel ways. The challenge isn’t just technical—it’s behavioral. How do we balance the benefits of connected technology with the risks of oversharing?
For military personnel, the answer might be strict device policies. For businesses, it’s about awareness and appropriate tools. For individuals, it’s understanding that convenience often comes at the cost of privacy.
The Strava story doesn’t mean we should abandon location technology. Instead, it highlights the need for:
Location data is powerful. The same patterns that exposed military bases can optimise supply chains, improve emergency response, and enhance customer service. The key is using this power responsibly.
Working with location data? Whether you’re protecting sensitive operations or leveraging location intelligence for business advantage, the right tools and policies matter. At Mapulus, we help Australian organizations harness location data securely and effectively.
Note: This article is for educational purposes about data security and location intelligence. Always follow your organization’s security policies regarding location-sharing applications.