← Back to stories A pair of Hoka running shoes with a Garmin watch beside them on a sunny outdoor track.
Photo by Jason Morrison on Pexels
凤凰科技 2026-04-01

Military officer reportedly exposed sensitive locations by wearing a smartwatch while running; security ministry warns personnel

What happened

It has been reported that an unnamed country's military officer leaked potentially sensitive information simply by wearing a consumer smartwatch while running. The country's Ministry of State Security reportedly issued a warning to military and security personnel after activity data — GPS traces, timestamps and biometric telemetry — was linked to sensitive sites through cloud sync or public activity feeds. Small devices. Big consequences.

Why it matters

Wearables collect detailed movement and health data and often back that data up to vendor clouds or social platforms. Remember Strava's 2018 heatmap, which revealed locations of overseas military bases? This is the same class of risk. Militaries around the world have already tightened rules on phones and cameras; why were wrist devices any different? In an era of sanctions and supply‑chain scrutiny, concerns also stretch to the provenance of hardware and software: who can access that telemetry, and under what legal or geopolitical pressure?

Practical and strategic implications

Reportedly the ministry urged personnel to stop using connected wearables in sensitive roles, to disable GPS and cloud sync, and to review app permissions and accounts. Simple mitigations exist — flight mode, local‑only devices, or purpose‑built, air‑gapped fitness trackers — but policy and training must catch up. Who is responsible when consumer tech intersects with national security: the user, the manufacturer, or the force that failed to anticipate the risk? For militaries, the answer is increasingly: all of the above.

Policy
View original source →