📡
Every Time Strava Exposed Military Positions
Soldiers went for a jog. The entire world found out where they were stationed.
A complete timeline of fitness tracker OPSEC disasters.
By The Numbers
120M+
Strava Users
Worldwide, uploading GPS data every day.
8B+
Activities Uploaded
Every run, ride, and swim, all with full GPS traces.
8+
Major Military Exposures
That we know about. The real number is certainly higher.
0
Times Truly Fixed
New defaults, new policies, same fundamental problem.
The Timeline
The Heatmap That Lit Up Secret Bases
January 2018Strava released its Global Heatmap, a visualization of every activity ever uploaded by its users. In major cities it looked like a cool data art project. In Afghanistan, Syria, and Somalia it was a classified intelligence disaster. Soldiers running laps around secret forward operating bases had outlined them on the map. Bases that didn’t officially exist were visible to anyone with a browser.
Consequence: The Pentagon issued new fitness tracker policies. The DoD banned GPS-enabled devices in deployed environments. Every branch of the military rewrote their electronic device regulations.
Individual Soldiers Identified at Secret Bases
2018The heatmap was just the start. Researchers cross-referenced Strava usernames, running routes, and public profiles at the exposed base locations to identify individual soldiers at classified facilities. Some profiles had real names, photos, duty stations, and home addresses. You could go from a dot on the heatmap to a service member’s Facebook page in a few clicks.
Consequence: Strava updated privacy defaults, but years of historical data had already been scraped and archived by OSINT researchers and, presumably, foreign intelligence agencies.
Polar Flow Exposes Intelligence Personnel
2019Researchers from Bellingcat and De Correspondent showed that Polar Flow, a competing fitness app, was actually worse than Strava. Its API let anyone pull the complete exercise history of any user, including locations. They identified military and intelligence personnel exercising near the NSA, MI6, the French DGSE, Guantánamo Bay, and nuclear weapons storage facilities. You could track individual agents from their workplace to their homes.
Consequence: Polar suspended its Explore feature. Multiple intelligence agencies launched internal reviews. The problem clearly wasn’t limited to Strava. It was every fitness platform with GPS.
French Sahel Patrol Routes Exposed
2020French soldiers deployed in the Sahel region of Africa uploaded patrol routes to Strava. The GPS traces showed exact paths, timing, frequency, and rest points of military patrols in active conflict zones. Anyone watching these routes could predict patrol schedules and pick ambush points.
Consequence: The French military tightened its operational security directives. Two years after the heatmap scandal, soldiers were still uploading activities in combat zones.
Russian Troop Positions Revealed in Ukraine
2022Before and during Russia’s invasion of Ukraine, Strava data gave away Russian military positions. Soldiers’ running and cycling routes near military installations showed troop concentrations, staging areas, and base layouts. OSINT analysts tracked unit movements and verified intelligence reports about the Russian buildup before the invasion was officially acknowledged.
Consequence: It became a textbook case in open-source intelligence. Strava data combined with satellite imagery and social media posts gave analysts a real-time picture of the invasion that rivaled classified intelligence.
US Secret Service Agents Exposed
2023Secret Service agents had been uploading runs to Strava with public profiles. Their routes near the White House and at travel locations revealed protective detail patterns, advance team movements, and security staging areas. All of it was visible to anyone.
Consequence: The Secret Service issued new personal device policies. Any adversary could use the data to study protective detail patterns and identify individual agents.
Russian Submarine Commander Killed on Jogging Route
July 2023Stanislav Rzhitsky, a Russian submarine commander who had ordered cruise missile strikes on Ukraine, was shot and killed while jogging in Krasnodar, Russia. He ran the same route at the same time regularly, and his Strava profile was public. His jogging patterns, pace, schedule, and exact GPS route were right there for anyone to see. He was killed on his habitual morning run.
Consequence: This is the most lethal known consequence of fitness tracker OPSEC failure. A military commander who launched missiles at Ukrainian cities was tracked and killed using the same GPS data that powers a free running app. Strava data isn’t just an intelligence risk. It’s a targeting tool.
French Aircraft Carrier Position Broadcast
March 2026A sailor aboard the French aircraft carrier Charles de Gaulle posted a jog on Strava while the ship was at sea. The carrier’s exact GPS coordinates showed up on the public activity map. A nuclear-powered aircraft carrier had its position broadcast to the world because someone wanted to log their 5K.
Consequence: The French Navy launched an investigation. Eight years after the original heatmap scandal, the same problem was still unsolved. A €3 billion warship, given away by a free fitness app.
How Fitness Trackers Leak
Four layers of failure, stacked on top of each other.
GPS by Default
Fitness apps record your precise GPS coordinates every second. Most users never change the default settings. The app knows exactly where you are, where you go, and how often.
Public Profiles
Strava and similar apps default to public or semi-public profiles. Your activities, routes, and sometimes your real name and photo are visible to anyone. Even "private" profiles often leak location data through segments and leaderboards.
Heatmap Aggregation
Strava’s Global Heatmap aggregates all user activity into a single visualization. In populated areas, individual routes disappear in the noise. In remote or classified locations, a single jogger’s route is impossible to miss.
API Scraping
Fitness platforms expose APIs that allow bulk data extraction. Researchers (and adversaries) can systematically query locations, pull user profiles, and cross-reference identities. What looks like a privacy setting in the app is often a suggestion, not a wall.
Glen's Take
Militaries spend billions on electronic warfare, signal intelligence, and counter-surveillance. Entire careers are dedicated to hiding asset locations. Satellites get repositioned. Radio frequencies are encrypted. Ships run dark across oceans.
And then a sailor goes for a jog and posts the aircraft carrier's GPS coordinates for the whole world to see.
Billions in military hardware, undone by a free fitness app and the human desire to track a 5K.
Get Glen's Musings
Occasional thoughts on AI, Claude, investing, and building things. Free. No spam.
Unsubscribe anytime. I respect your inbox more than Congress respects property rights.
Protect Your Own OPSEC
Gear for people who prefer not to broadcast their location to the entire internet.
Garmin Forerunner GPS Watch
At least you can turn off live tracking.
Find on AmazonFaraday Bags for Phones
Block all signals. Goes dark instantly.
Find on AmazonOPSEC & Cybersecurity Books
Learn what not to post.
Find on AmazonTactical Fitness Gear
Work out without broadcasting it.
Find on AmazonHOKA Running Shoes
For runs you keep to yourself.
Find on AmazonPrivacy Screen Protectors
Keep your screen to yourself.
Find on AmazonFrequently Asked Questions
Has Strava fixed the military base exposure problem?
Not fundamentally. Strava has added privacy zones, updated default settings, and allowed users to opt out of the heatmap. But the core issue remains: GPS-enabled fitness apps collect precise location data by design, and users (including military personnel) consistently fail to configure privacy settings. The 2026 aircraft carrier incident, eight years after the original scandal, proves the problem is unsolved.
Can the military just ban fitness trackers?
Several militaries have tried. The US DoD banned GPS-enabled devices in operational areas after the 2018 heatmap incident. But enforcement is inconsistent, personal phones still have GPS, and many service members use fitness apps during off-duty hours at or near bases. The ban reduces risk but doesn’t eliminate it, as every subsequent incident has shown.
Is Strava the only fitness app with this problem?
No. Polar Flow, Garmin Connect, Apple Health, Google Fit, and basically every GPS-enabled fitness platform has the same vulnerability. Strava gets the most attention because of its user base and the heatmap feature, but the underlying issue (apps that record and share precise GPS data) is industry-wide.
Know someone in the military who still has Strava on public?
Get Glen's Musings
Occasional thoughts on AI, Claude, investing, and building things. Free. No spam.
Unsubscribe anytime. I respect your inbox more than Congress respects property rights.
Keep Exploring
Chuck Norris
Air Force veteran, martial arts legend, and the man the military wishes their OPSEC was modeled after.
Read moreTitanic Darkness
What actually happened after the ship went under. A moonless night, 28-degree water, and 20 minutes of screaming.
Read moreViral Internet Legends
The accidental celebrities and moments that broke the internet before anyone could hit delete.
Read moreSportsMichael Jordan
The most competitive athlete who ever lived, and the insane stories that prove it.
Read moreAdventureNazare Big Wave
100-foot waves off the coast of Portugal. The people who ride them are either brave or out of their minds.
Read more