Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Privacy Security United States

Pentagon Restricts Use of Fitness Trackers, Other Devices (apnews.com) 71

Military troops and other defense personnel at sensitive bases or certain high-risk warzone areas won't be allowed to use fitness tracker or cellphone applications that can reveal their location, according to a new Pentagon order. From a report: The memo, obtained by The Associated Press, stops short of banning the fitness trackers or other electronic devices, which are often linked to cellphone applications or smart watches and can provide the users' GPS and exercise details to social media. It says the applications on personal or government-issued devices present a "significant risk" to military personnel so those capabilities must be turned off in certain operational areas. Under the new order, military leaders will be able to determine whether troops under their command can use the GPS function on their devices, based on the security threat in that area or on that base. "These geolocation capabilities can expose personal information, locations, routines, and numbers of DOD personnel, and potentially create unintended security consequences and increased risk to the joint force and mission," the memo said. Zack Whittaker, a security reporter at TechCrunch, said, DoD's statement today appears to be a response to the revelation that fitness tracker app Polar was exposing locations of spies and military personnel.
This discussion has been archived. No new comments can be posted.

Pentagon Restricts Use of Fitness Trackers, Other Devices

Comments Filter:
  • ... locations get the Streisand Effect.

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      Except these bases are typically in remote areas where the only fitness tracker activity is from military personnel.

      • by arth1 ( 260657 ) on Monday August 06, 2018 @01:54PM (#57079640) Homepage Journal

        It's not just a problem with bases and exact positions. It's a problem that individuals can be tracked over time. If you see someone one week do runs in Langley, and the next week do runs in a remote location in Nicaragua, you may have a diplomatic crisis on your hands.

        • It's more than that. By looking at users whose location corresponded to CIA HQ in Langley during the day, for example, they could determine those individuals who worked in the CIA. And by backtracking the location of those individuals to where they were early in the morning, their home address could be determined. When cross-referenced against public databases, this allowed them to determine the identities of any CIA agent working at Langley using the app, along with their home addresses and daily routine.
          • by mysidia ( 191772 )

            they could determine those individuals who worked in the CIA. And by backtracking the location of those individuals to where they were early in the morning, their home address could be determined

            Shoot.. this could probably done without an app just by triangulating IMEIs as multiple cellular stations detect the same IMEI; I imagine the carriers could already easily do this --- monitor what IMEIs are frequently detected near a known CIA location, and where that same IMEI is during the early morning, lat

            • by EvilSS ( 557649 )
              Or war-driving their cars. I live near an interstate and my wifi system (ubiquity) logs "near-by" access points by default. I see 30-40 GM vehicles an hour with their onboard wifi hotspots blasting out their SSID and unique MAC. Seems like they are on by default because they way out number any other maker. I only see a handful of Fords, for example.
          • What is it called if someone from for example UK exposes those identities?
            Internet is global and we have satellites that can read news papers from space with ease.
            Anyone with such access can monitor CIA HQ and see who are there and expose them that way. So why focus on fitness trackers and such?! Seems odd to me when the same info can easily be collected another way which is just as easy.

      • Except these bases are typically in remote areas where the only fitness tracker activity is from military personnel.

        Ya, but how are people stationed at CIA black-sites supposed to track their cardio now?

        • by Anonymous Coward

          on Android, IPBike (afaik) stores workouts locally on the phone, not in the cloud. So if you have an Ant+ phone (or dongle), and ant+ hrm, you could then track your workouts on your phone. The only problem that I then see is plotting one's route, as that'll use Google Maps API to track the lat/long locations into the map. So there's a data leak there the DOD may not want

  • by Anonymous Coward

    No point it letting an easily compromised cloud GPS reporting service track your movements.

  • by sanf780 ( 4055211 ) on Monday August 06, 2018 @12:35PM (#57079126)
    I understand fitness trackers (app and/or device) are too happy to share your location with friends and strangers. However, Google Maps probably uses your data for some function of Google Maps. I know it can record where your workplace is and where you last parked your car. So, why do Pentagon workers are allowed to bring mobile phones is my guess.
    • by Kenja ( 541830 ) on Monday August 06, 2018 @12:38PM (#57079156)
      They already restrict the carrying and usage of [mobile devices [defense.gov], including phones.
      • That and I expect approved devices if having tracking on them would have appropriate safeguards with the vendors.
        Otherwise the bad guys can just buy Google Ads, that would target troops, and based on their impression counts, they can keep track of the opposing troops.

      • ...the only way these trackers work is if there's a cell phone or wifi signal...most use bluetooth to that signal...
        • by thomn8r ( 635504 )
          the only way these trackers work is if there's a cell phone or wifi signal...most use bluetooth to that signal.

          What you're missing is that these devices store the information until such time as they get a network, and then upload the stored data.

          • ...I didn't miss that at all - i'm technical, I have one, I know how they work...when I went to Germany a few years ago and came back it tracked me in waldorf...
      • All SCIFs at the Pentagon already required that any electronic devices(computers, cellphones, smartwatches, etc) be placed into a secure locker before entering. This is redundant.

        Regardless, 6ft thick granite walls does a number of cell signal. Other than the metro entrance and the interior quad, you don't have reception inside the building
    • by hey! ( 33014 )

      Frankly, for many jobs I think having a smartphone at all is probably not a good idea -- for that matter devices like smart speakers. Anything like that needs to have a hardware "off" button that ensures they aren't listening or transmitting.

      But I'm not sure how secure modern feature phones either in the era of enhanced 911.

      • by hawguy ( 1600213 )

        Frankly, for many jobs I think having a smartphone at all is probably not a good idea -- for that matter devices like smart speakers. Anything like that needs to have a hardware "off" button that ensures they aren't listening or transmitting.

        But I'm not sure how secure modern feature phones either in the era of enhanced 911.

        How do you know that hardware off button is really a hardware off button on your particular device? Even if you take out the batteries, maybe there's a hidden capacitor that's powering the secret listening device. Do you need to do a complete tear-down periodically?

        • If you're susceptible to that level of paranoia you should probably wear a full-body tinfoil suit, just in case someone put a tiny listening device on your clothes.

          What to do if they put a listening device on your tinfoil suit ... you'll have to figure that one out on your own.

          • by hawguy ( 1600213 )

            If you're susceptible to that level of paranoia you should probably wear a full-body tinfoil suit, just in case someone put a tiny listening device on your clothes.

            you mean like the level of paranoia where you don't trust the off button on your phone? I you think someone has tampered with your phone or software enough to disable the soft-off button, why don't you think that they've tampered it in such a way that the device can still record when it's "off"?

        • by hey! ( 33014 )

          Well, *I* could trace the circuit. Also, a switch position could cut out the mic as well.

    • I know it can record where your workplace is

      I'm working on site at the moment and I get constant notifications from Maps asking me "do you still work here? Update your work address".

      So not only does it know where I work, but it knows I haven't been there for a while.

  • by zlives ( 2009072 ) on Monday August 06, 2018 @12:55PM (#57079268)

    how will the spies know if they are healthy or not... when they compare their data with the other spies of the world. How will will know whose spies are the best of the best.
    i mean if i couldn't look at the weather data with location activated how ill i know if its raining outside or not...

  • I'm dumb. Wouldn't using a cell phone at all expose your location the way cell towers work?

    Sorry for the stupid question.

    • If you were using the phone in a restricted area, sure. But you're not supposed to do that. I imagine the concern with a fitness tracker is that they often upload your route and steps to the cloud so you can gamify fitness with your social networks or whatever crap, which means that someone can hack into Fitbit and look up patrol routes, even if the good solider left his phone out of the secure area like he was supposed to.
  • Duh!.. (Score:5, Informative)

    by mi ( 197448 ) <slashdot-2017q4@virtual-estates.net> on Monday August 06, 2018 @01:00PM (#57079306) Homepage Journal

    Took them a while. The problem's been known for years — even in peaceful Finland [yuki.la]... And Russians have used malware to get location-data to target Ukrainian forces [reuters.com]. And, of course, the NATO [wsj.com].

    • And Russians have used malware to get location-data to target Ukrainian forces.

      I am sorry, but you need to spend about 20 seconds of your google time to find out that this story has been debunked and Crowdstrike partially retracted its claims. This was pretty much a manufactured story released in December of 2016 back when the media hysteria about Russian hacking and interference was just picking up steam.

      • by mi ( 197448 )

        When claiming anything having been "debunked", you absolutely must include a link to the debunking...

        Crowdstrike partially retracted its claims

        And to the retraction.

  • Unsafe at any speed. Does the Pentagon not still prohibit cameras of any type on secure installations?
  • If Android didn't have its security model completely inside out and upside down, the rule from on high would be that military personnel on sensitive assignment aren't allowed to enable the gather-location API altogether.

    Then the apps would need to decide whether to limp along without those services available on that particular installation, or pull the chute with a feeble dog-ate-my-programming-skills excuse in the mold of "Javascript required" as if 90% of the site's functionality (99% of the site's useful

Neutrinos have bad breadth.

Working...