Fitness OSINT: Identifying and tracking military and security personnel with fitness applications for intelligence gathering purposes
Journal Title: Security and Defence Quarterly - Year 2020, Vol 32, Issue 5
Abstract
The objective of this paper is to demonstrate the possibility of tracking and identifying military and other security personnel, operating in secretive or restricted areas. Such exposure might have dire consequences from the perspective of counterintelligence or physical security. Open Source Intelligence (OSINT) and Social Media Intelligence methods and techniques were employed to gather and analyse information on security and military personnel and expose their activities on-line. The case studies presented in the article exemplify utilisation of the new “Suunto” fitness application for open-source-based intelligence research. Despite general Operational Security rules that require all personal data such as names, pictures and habits to be kept discreet, open-source based research with one of the most popular fitness applications allowed the identification of military personnel and government agents operating in Afghanistan, Mali, Syria or working at national military facilities. In a single case, it took the author less than thirty minutes to identify personal details of a US Army soldier in Afghanistan and a Special Forces officer in one of the European countries and obtain their home addresses and pictures of them and their families. The results of the research show how OSINT techniques concerning fitness applications are useful both for intelligence and counterintelligence, specifically for malicious and terrorist purposes, and how necessary it is to make fitness and other, supposedly personal, activity private, especially for those who carry out sensitive missions and work in a restricted or secretive environment.
Authors and Affiliations
Cyprian Aleksander Kozera
Unknown gunmen and insecurity in Nigeria: Dancing on the brink of state fragility
There is a compelling need to address the protracted and recurring multidimensional insecurity in Nigeria. The prevalence of insecurity in the country is multipronged and caught in a cyclic web. Insecurity in Nigeria com...
Hellenic air - space violations by Turkish aircraft: A statistical assessment and a forecast
This paper aims to assess the extent to which repeated attacks against sovereign Hellenic air space by Turkey along with the inevitably ensuing engagements between aircraft of the two sides follow a certain predetermined...
Development economics of defence in Czechoslovakia and the Czech Republic 1950–2015 in comparison with the economics of defence in developed countries
The article describes the development of the economics of defence in Czechoslovakia and the Czech Republic between the Marxist paradigm background and the concept of defence economics in developed countries. New research...
Hybrid warfare challenges.
In this article, hybrid warfare challenges and their impact on the evolution of warfare in the new dynamic security environment are analysed. The aim of the research was to identify hybrid threats, explore the complexity...
The New Institutionalism: A tool for analysing defence and security institutions
The aim of this paper is to investigate new institutionalism, its trends and their application in the analysis of security and defence institutions. The research is based on an analysis of theoretical literature to explo...