Equipment lies ready to go November 14, 2002 in an overall view of Ft. Bragg, North Carolina.
In the latest incident of seemingly innocuous data sharing leading to potentially dangerous exposure, the popular fitness app and activity trackers Polar Flow has been revealing the location of military and government personnel working at sensitive locations, according to ZDNet.
The report cites an investigation conducted by Dutch news site De Correspondent and Bellingcat, which discovered it was possible to find workout information recorded by Polar Flow and use it to potentially identify the names employees working at military bases and government buildings.
Per ZDNet, the technique included accessing the developer API from Polar, the Finnish-based company that produces Polar Flow. Through the API, a person can not only explore public data that users willingly share, but could also retrieve fitness tracking information from users who have their profiles set to private. The API also didn’t put a limit on the number of requests a person could make, so it was feasibly possible that someone could scrape information from the millions of users who rely on Polar Flow to track their workouts.
Using that essentially unfettered access, it became possible to identify people working at sensitive locations like military bases. De Correspondent explained the technique simply required looking up a known government or military installation, finding a work out that was tracked there, then exploring that user’s other workouts. Odds are, the user has worked out at or near their home in the past.
Those few data points allowed the researchers to identify more than 6,400 users believed to be working at sensitive locations. According to ZDNet, the researchers pegged employees of the NSA, the White House, British intelligence agency MI6, the Russian GRU, and others. That data was also used to identify staff at nuclear storage facilities, missile silos, prisons, and locations like Guantanamo Bay.
Once a user is exposed through the technique discovered in the investigation, their locations become a lot more interesting and potentially revealing. For example, reporters at De Correspondent were able to spot users identified as foreign military and intelligence officers working out near sensitive government locations in the US.
Polar acknowledged the issue to ZDNet and said the situation is being addressed, though it downplayed the potential seriousness of the data exposure:
“Currently the vast majority of Polar customers maintain the default private profiles and private sessions data settings, and are not affected in any way by this case,” said the statement. “While the decision to opt-in and share training sessions and GPS location data is the choice and responsibility of the customer, we are aware that potentially sensitive locations are appearing in public data, and have made the decision to temporarily suspend the Explore API.”
This isn’t the first time a fitness app has accidentally exposed potentially sensitive information about the government and military. Earlier this year fitness tracking map Starva came under fire once it was discovered that the company’s heat maps, which show user activity around the world, could be used to identify military bases, including some locations that were previously secret.