• Skip to primary navigation
  • Skip to main content
  • Skip to footer
Logo of Agilient Security Consultants, Australia

Agilient Security Consultants Australia

The Best Security Consultants

Menu
  • Industries
      • Aviation and Airport Security Consultants Australia
      • Defence Industry Security Consulting
      • Government Security Consulting
      • Healthcare & Hospitals Security Consulting
      • Corrections and Detention
      • Maritime Security Consultant
      • Aged Care Facilities
      • Mining, Oil & Gas
      • Public Venues & Events
      • Rail
      • School and Education Security Consultant
      • Telecommunications Security Consultant
      • Utilities
      • Places of Faith and Worship
    • advice-colleagues-communication-newIndustries
  • Services
      • Cybersecurity Consultants
      • Protective Security
      • Business Resilience
      • Building Security Consultants
      • Security Audits
      • Cyber Audits
      • Data
      • Pandemic Planning
      • Azure
      • Electronic Security
      • IT Disaster Recovery Planning
      • Business Continuity Consultants
      • Identity Theft Consultant​
      • Security Consultants
      • Security Camera and CCTV Consultant
      • ISO
      • Duress Alarms
      • Cloud
      • AWS
      • Awareness Training
      • Penetration Testing
      • Security Risk Assessment Consultants
      • Managed Security Service Provider
      • Protection against Vehicles as a Weapon
    • training-1Services
  • Locations
    • Security Consultant Melbourne
    • Security Consultant Sydney
    • Security Consultant Brisbane
    • Security Consultant Adelaide
    • Security Consultant Canberra
    • Security Consultant Perth
  • Resources
    • menumanagers-dealing-customer-agreTraining
    • working-together-newJoin The Tribe
    • Webinars_3-1.jpgUpcoming and Past Events
    • hacking-detected-shutterstock_newResources
  • Articles
  • About
    • About Us
      We are an Australian owned and operated security company specialising in risk, cybersecurity, protective security, crisis and business continuity management services.
    • frequently-asked-questions-smallFAQ’s
    • bg-menu-government-institutionsConsultant Registration
  • Contact Us
Contact Us

Maintaining a Balance With Modern Technology and Security Risk – Strava ‘Breach’

You are here: Home / Security News / Maintaining a Balance With Modern Technology and Security Risk – Strava ‘Breach’

This week the military activities of America’s national security forces were exposed by a simple fitness tracking app. The Strava app published global heat maps online, which tracked and displayed the movements of app users working in American military bases.  This accidental exposure was noticed by international security student Nathan Ruser[1] who noted that Strava’s maps showed most western cities aglow with the activities of numerous users, but US military bases in the Middle East were easily highlighted due to specific activity in remote areas.

As a result, the US military and US lawmakers are looking into a way to address what is essentially an accidental breach of security[2].  For the time being, the US Army has stated that the heat maps have not revealed anything that wasn’t already known and that no information of great importance was exposed.

The release of the data poses a troubling security issue.  With more and more people utilising wearable technology, accidental breaches of privacy and security are inevitable.  In this case, where some heat maps reveal the exercise or daily routines of military officers in places like Iraq or Afghanistan, such data can be weaponised in disastrous ways[3].  Military assets can be easily targeted for an attack and ambushes in rough terrain are made possible by tracking the mapped movements of particular officers.

Strava is not the only app that could accidentally cause a security issue.  Any app that can access personal data or a GPS location has the potential to expose activities and a specific location to the public.  Other apps such as Foursquare, Yelp and a personal Google account will usually ask you to check in to your location if you have your GPS settings on.

One key aspect of this security issue is the limited understanding that users have with regards to their privacy.  The public is mainly concerned with the kind of cyber security breaches where their data is hacked or leaked, in particular, data breaches that might steal identities and money.  Most people are rarely concerned about the fact that apps and other portable tech are tracking everything they do and everywhere they go.  When apps like Strava or Yelp provide easy and simple day-to-day services, we rarely consider the price we pay with regards to our privacy.

Nevertheless, appropriate training, monitoring and policies should be developed and imposed on employees who work in high-security positions.  In the case of the military, it is imperative that all military personnel are trained and informed to check the privacy settings on their phones and computers or simply not use it while on deployment.  While these kinds of measures might seem drastic – it is perhaps the only sensible to maintain security when working in troublesome or high security areas.

New apps are developed every day that make our lives easier but not necessarily safer with regards to our privacy.  The balance between technology giving us almost unlimited access to services and information, and maintaining our privacy and security is hard to maintain.  It will only become even more difficult as technology progresses further.

It is important to make thorough assessments of the technology used at work and at home and what their privacy and security parameters are.  Learning about and opting out of any location and privacy services might be the first step in keeping your day-to-day habits out of the hands of strangers. Otherwise, security policy development will have to consider offline technology, as well as ‘going dark’ in some instances, if we want to want to ensure the complete security of your home or business.

For further information on mobile device management and the potential risk new applications and other technologies may pose to your organisation, please do not hesitate to contact Agilient.

The Agilient Team

[1] https://www.abc.net.au/news/science/2018-01-29/strava-heat-map-shows-military-bases-and-supply-routes/9369490

[2] https://www.businessinsider.com.au/strava-ceo-responds-heat-map-exposes-secret-us-military-bases-around-the-world-2018-1

[3] https://www.forbes.com/sites/sethporges/2018/01/29/strava-was-just-the-beginning-even-seemingly-innocent-data-can-be-weaponized/#2662f0ec126f

Tweet
Share

Security News

Looking for a security partner? Get in touch with Agilient.

Looking for practical and cost-effective security and risk solutions for your government department, agency or company? Speak with Australia’s leading senior security, risk and resilience experts.


Looking for a pandemic planning partner? Get in touch with Agilient.

Looking for practical and cost-effective risk management solutions for your government department, agency or company? Speak with Australia’s leading senior risk and emergency management experts.



Footer

Agilient is a proud member of

Ai Group Defence Council
Australian Industry & Defence Network
Australian Security Industry Association
Sydney Aerospace & Defence Interest Group

Company and Licensing Details:

ABN: 37 157 911 441
NSW Security Master Licence # 410783087
ACT Security Master Licence # 17502184
Vic Security Registration # 878-460-40S
Qld Security Firm Licence # 3834422

Join The Tribe

Sign up to receive our regular Agilient newsletter including the latest security, risk and resilience updates

Sign up now

Copyright © 2025 Agilient – Level 14, 275 Alfred St, North Sydney NSW 2060 Australia – 1300 341 692

Our Services

Security Consultant

Security Consultant Sydney

Security Consultant Melbourne

Security Consultant Canberra
Security Consultant Perth

Security Consultant Adelaide

Security Consultant Brisbane