Fitness OSINT: Identifying and tracking military and security personnel with fitness applications for intelligence gathering purposes
Journal Title: Security and Defence Quarterly - Year 2020, Vol 32, Issue 5
Abstract
The objective of this paper is to demonstrate the possibility of tracking and identifying military and other security personnel, operating in secretive or restricted areas. Such exposure might have dire consequences from the perspective of counterintelligence or physical security. Open Source Intelligence (OSINT) and Social Media Intelligence methods and techniques were employed to gather and analyse information on security and military personnel and expose their activities on-line. The case studies presented in the article exemplify utilisation of the new “Suunto” fitness application for open-source-based intelligence research. Despite general Operational Security rules that require all personal data such as names, pictures and habits to be kept discreet, open-source based research with one of the most popular fitness applications allowed the identification of military personnel and government agents operating in Afghanistan, Mali, Syria or working at national military facilities. In a single case, it took the author less than thirty minutes to identify personal details of a US Army soldier in Afghanistan and a Special Forces officer in one of the European countries and obtain their home addresses and pictures of them and their families. The results of the research show how OSINT techniques concerning fitness applications are useful both for intelligence and counterintelligence, specifically for malicious and terrorist purposes, and how necessary it is to make fitness and other, supposedly personal, activity private, especially for those who carry out sensitive missions and work in a restricted or secretive environment.
Authors and Affiliations
Cyprian Aleksander Kozera
Hybrid warfare challenges.
In this article, hybrid warfare challenges and their impact on the evolution of warfare in the new dynamic security environment are analysed. The aim of the research was to identify hybrid threats, explore the complexity...
The rules and organization of air traffic at airstrips during military operations: Based on experience gained on missions in Chad and Afghanistan
The aim of the article is to present the characteristics of airstrips used by Polish and allied aircraft during military operations in Chad and Afghanistan. The main goal is to examine their organisation and the manageme...
Geodata sources and geoinformation systems in hydrometeorological security.
A definition of the concept of information was placed in the publication of spatial ata with reference to the hydrometeorological systems covering the country. The next keys to the encryption and transmitting of hydromet...
Challenges and changes for the Polish Armed Forces in relation to Polish security policy.
----------
Values and norms of behaviour in the life of cadets
The aim of this paper is to analyse the meaning, role and place of values in the life of a soldier. Furthermore, the article explores the issues of soldiers’ ethical standards and types of behaviour which can be found in...