Reed NewsReed News

UK Military Sites Exposed as Troops Track Runs on Strava App

Crime & justiceCrime
UK Military Sites Exposed as Troops Track Runs on Strava App
Key Points
  • Over 500 British Armed Forces members tracked runs on Strava, exposing sensitive military sites.
  • HMNB Clyde nuclear base had 110 individuals tracking runs, with data revealing submarine deployments and warship photos.
  • Overseas bases and personnel were also exposed, including at RAF Akrotiri and Diego Garcia.

Staff at the British military's nerve centre in Northwood have publicly tracked their runs on Strava, part of a broader pattern that includes 519 contractors, officers, staff, and family members at some of the UK's most sensitive bases logging runs within restricted areas on the app since January 2026. This widespread data exposure stems from users sharing their fitness activities with public settings, inadvertently mapping out secure locations. The scale of the issue underscores a significant operational security lapse across multiple installations.

At the critical nuclear submarine base HMNB Clyde in Faslane, home to the UK's nuclear deterrent, 110 individuals have publicly tracked runs since the start of the year. One running route logged on Strava within HMNB Clyde's restricted area revealed information that helped identify the specific nuclear submarine an official was deployed onto, while another official at the base posted photos of warships entering the Scottish port on their Strava account. These disclosures provide granular insights into daily operations and personnel movements at a facility central to national security. The combination of geolocation data and visual evidence creates a composite picture that could be exploited by adversaries.

Overseas bases and personnel have also been exposed through Strava tracking. Personnel stationed at overseas bases, including RAF Akrotiri in Cyprus and Diego Garcia in the Indian Ocean, were identifiable through the app. Runners at one joint UK-US base jokingly call their route 'Security Breach' in Strava's public data, highlighting a casual attitude toward security protocols even in remote locations. This international dimension extends the vulnerability beyond UK borders, affecting allied operations and shared facilities.

The personal security risks are profound, as the personal details of staff, including home addresses, identities of relatives, and linked social media accounts, can be exposed through Strava data. This information, when combined with location tracking, creates a comprehensive profile of individuals that could be used for targeted attacks or manipulation. Family members and associates may also become collateral targets, amplifying the threat beyond active service personnel. The aggregation of such data over time allows for pattern analysis that reveals routines and vulnerabilities.

Military staff of all ranks, from troop commanders and lieutenants to intelligence experts, are logging data on Strava. This indicates that the security lapse is not confined to junior personnel but permeates the chain of command, including those with access to classified information. The involvement of intelligence experts is particularly concerning, as their profiles might inadvertently reveal methodologies or affiliations. The breadth of ranks involved suggests a systemic failure in training or enforcement regarding digital footprint management.

Security experts warn that this has raised concerns that hostile actors could gather intelligence about sensitive sites and harvest personal details for blackmailing purposes. A senior military source based at the British military's headquarters in Northwood described the problem as posing a major security risk, exposing staff to potential blackmail and coercion, and amounting to valuable intelligence for adversaries. The potential for blackmail is heightened by the personal nature of the exposed data, which could be used to pressure individuals into divulging secrets or committing acts of espionage. Such scenarios represent a direct threat to operational integrity and national security.

This incident occurs within a context of ongoing security threats to UK military facilities from foreign intelligence. Drones, proxies, and spies suspected of working for adversaries are routinely caught testing the boundaries of UK facilities. Last month, an Iranian man and a Romanian woman were arrested after allegedly attempting to enter HMNB Clyde in Faslane, demonstrating active probing of secure sites. British NATO staff have been warned of attempts by suspected Russian intelligence officials to spy on them, highlighting a persistent and multifaceted threat environment. These incidents show that adversaries are continuously seeking vulnerabilities to exploit.

The problem poses a major security risk, exposing staff to potential blackmail and coercion, and amounts to 'damn good intelligence for the enemy'.

senior military source, Senior military source based at the British military's headquarters in Northwood

Internationally, the French military has faced a similar issue, with a soldier revealing the position of an offshore aircraft carrier last month by logging runs on Strava. This parallel case suggests that the problem is not unique to the UK but affects allied forces globally, pointing to a common challenge in balancing fitness tracking with security. The recurrence of such incidents across different militaries indicates a need for coordinated best practices and technological safeguards. Shared lessons could help mitigate risks across NATO and other partnerships.

Historically, this is not the first time sensitive information has been exposed through Strava; in 2018, a heatmap revealed activity at Faslane and other global military sites. That earlier incident prompted warnings and some policy adjustments, but the current data shows that vulnerabilities persist, suggesting incomplete implementation or evolving app features that outpace security measures. The repetition of similar exposures over years points to a cyclical problem where temporary fixes fail to address root causes. This history underscores the difficulty of maintaining security in an era of ubiquitous digital tracking.

The strategic implications are significant, as while the location of British bases is not secret, Strava data could provide adversaries with useful intelligence about military operations. Details such as patrol routes, shift patterns, and personnel concentrations can be inferred from aggregated fitness logs, offering insights into readiness and routines. This operational intelligence could inform planning for espionage, sabotage, or cyber attacks, making forces more predictable and vulnerable. The cumulative effect of small data points can reveal larger strategic pictures over time.

Politically, Conservative MP Ben Obese-Jecty, a former army officer, condemned the security lapse. He said the recent lapse in security by the British Armed Forces is surprising given the current threat from adversaries. Obese-Jecty also noted that he stopped using Strava when he became an MP and locked down his profile, stating that the app has features to keep data private. His criticism reflects broader concerns about accountability and preparedness within the military establishment.

Key unknowns remain regarding what specific actions, if any, the UK Ministry of Defence or military command has taken to address the Strava security lapse and prevent future occurrences. It is also unclear whether any disciplinary measures have been imposed on the military personnel who exposed sensitive information via Strava, as no public announcements have been made. The lack of transparency on these points leaves open questions about the seriousness with which the issue is being treated internally.

Another unknown is the extent to which hostile actors have already accessed or utilized the exposed Strava data for intelligence gathering or blackmail. Similarly, how the Strava data exposure compares to other cybersecurity or operational security vulnerabilities within the British Armed Forces has not been assessed publicly, making it difficult to gauge its relative severity. These gaps in knowledge hinder a full understanding of the incident's impact and the adequacy of response measures.

Additionally, the timeline and process for when the military became aware of the Strava issue and why it was not addressed sooner remain unclear. Delays in response could indicate systemic failures in monitoring or reporting channels, or perhaps a underestimation of the threat. Clarifying these aspects would help in evaluating the effectiveness of current security protocols and identifying areas for improvement to prevent similar lapses in the future.

Tags
Corroborated
Daily Mirror - NewsDaily Express - UK NewsMetro - MainDaily Mail - NewsGB News+4
9 publications · 10 sources
View transparency reportReport inaccuracy
UK Military Sites Exposed as Troops Track Runs on Strava App | Reed News