The Practice of Indiscretion: From Atmospheric Secrecy to the Metadata Panopticon

The fundamental tension of operational security (OPSEC) lies in the conflict between the human necessity for communication and the military requirement for silence. Historically, the preservation of strategic surprise was managed through the absolute control of physical information—letters, telegrams, and the very description of the environment. In the contemporary era, this paradigm has shifted from the censorship of words to the management of digital exhaust. The transition from the "weather rule" of the 1940s to the "Signalgate" of 2025 illustrates a profound erosion of discipline, where the convenience of commercial technology has bypassed the rigid structures of classified communication. While the tools have evolved from signal flags and V-mail to encrypted messaging and fitness trackers, the core vulnerability remains the individual’s inclination toward social connection and technical convenience.

The Atmospheric Shield: The Historical Strategic Value of Weather

During the mid-twentieth century, meteorological data was recognized not merely as scientific information but as a primary strategic asset. The ability to predict weather patterns allowed commanders to time invasions, optimize aerial bombardment, and manage naval logistics. Consequently, weather reporting became one of the most strictly policed forms of information during World War II. Following the attack on Pearl Harbor, the United States Weather Bureau was immediately pivoted toward military utility under Executive Order, establishing a direct and subordinating relationship with the War Department and the Navy.1 Circular Letter 170-41 formalized this shift, mandating that meteorological science be treated as an instrument of war.1

The Mechanisms of Meteorological Censorship

The restriction of weather data was comprehensive, targeting both official distribution and public perception. The National Weather Bureau implemented a series of "Censorship Codes" that transformed the daily life of American civilians. While airport stations continued to observe weather hourly, the distribution of these observations was strictly limited to military representatives and essential airline personnel.1 Within the Bureau’s offices, maps and reports were kept in locked drawers, and briefings for pilots were stripped of the "why" behind the weather, providing only a binary "go/no-go" for flights.1

For the public, the Office of Censorship issued codes that limited newspaper forecasts to a 150-mile radius of the publication city and capped the number of reported observations at twenty locations.1 Most critically, no weather data whatsoever could be reported from the western United States—encompassing Montana, Idaho, Utah, Nevada, Arizona, California, and Washington—to deny Japanese forces any insight into Pacific-originated fronts.1 Radio, due to its ease of interception by enemy naval vessels, faced even harsher restrictions; announcers were prohibited from mentioning any weather details, including summaries or even casual descriptions of rainfall.2

Restriction Type

Specific Regulatory Measure

Strategic Rationale

Newspaper Forecasts

Limited to 150 miles from publication city.1

Prevented triangulation of moving weather fronts across the continent.

Regional Blackouts

Total reporting ban on 7 Western states.1

Denied Japan meteorological intelligence for Pacific operations.

Radio Broadcasts

Prohibited from airing all weather data, including "recapitulations".2

Prevented interception by U-boats and enemy reconnaissance vessels.

Office Security

Observation maps kept in locked drawers; office tours discontinued.1

Mitigated risk of domestic espionage or "walk-in" intelligence collection.

Almanac Regulation

Exemption for seasonal "indications" vs. short-term forecasts.2

Balanced historical civilian needs with tactical secrecy requirements.

This culture of silence was so pervasive that even the First Lady, Eleanor Roosevelt, was officially reprimanded for a column mentioning that she and her guests had exercised "between showers".2 The logic was that an astute adversary could use such a data point, combined with others, to map the movement of a storm system and predict the visibility conditions at nearby naval ports. The "Loose Lips Sink Ships" campaign was not merely a slogan but a rigorous social enforcement mechanism that viewed every casual remark as a potential vector for intelligence leakage.3

Historical Precedents in Military Correspondence

The practice of self-censorship and institutional monitoring extends back to the American Civil War. Diaries and letters from the 1860s reveal a constant struggle between the soldier’s desire to share the "terror and aspirations" of war with family and the military's need to hide its strength and location.4 Soldiers like Moses Sleeper recorded the arrival of commanders like George Washington in Cambridge during the Revolutionary War, noting the weather as a defining factor of the event’s "muted, serious" tone.5

By the Civil War, General William Tecumseh Sherman became a legendary figure in his hatred for the press, referring to war correspondents as "spies and defamers" and "dirty newspaper scribblers".6 Sherman’s enmity was rooted in the tactical reality that Northern newspapers often detailed imminent attacks, providing the South with speed and quantity of information "undreamed of a generation before".6 This early collision between the emerging speed of the telegraph and the traditional need for operational surprise established the foundation for the 20th-century censorship bureaus.

During World War II, the introduction of "V-Mail" (Victory Mail) provided a technical solution to both logistical and security challenges. By microfilming letters to save shipping space, the military also facilitated easier review by censors, who would physically excise questionable material with scissors.7 Officers were routinely assigned "handfuls of letters" to read on their non-flying days, ensuring that no mention of map coordinates, non-English text, or coded "games" left the unit.8 This manual, labor-intensive process ensured that the "weather rule" and other OPSEC mandates were strictly followed, though at the cost of the personal privacy of millions of service members.

Cryptographic Shields and Professional Failures

The historical anecdotes of accidental disclosure often highlight the friction between the intelligence community's success and the public's right to know. One of the most significant leaks of the 20th century occurred after the Battle of Midway in June 1942. The Chicago Tribune published a detailed account of the "Jap Fleet" being smashed, including precise fleet dispositions that could only have been known if the United States had broken the Japanese naval codes.9

This information was derived from "Station Hypo" at Pearl Harbor, where cryptanalysts had cracked the JN-25 code.9 The leak nearly alerted the Japanese to the vulnerability of their communications, a blunder that could have reset the cryptographic landscape of the Pacific War. The government’s attempt to prosecute the Tribune highlighted the "inherent tensions with democracy" that continue to plague the classification system today.10

The Navajo Shield and the Human Element

Conversely, the use of the Navajo language as a tactical code represents a rare instance where the human element provided an unbreakable shield. Unlike the mechanical complexity of the German Enigma or the Japanese "Purple" machines—both of which were eventually compromised by Allied "Magic" and "Ultra" operations—the Navajo code was never broken.11 The code talkers developed a dictionary of hundreds of terms where "submarine" became besh-lo (iron fish) and "air" was translated literally, creating a linguistic barrier that neither German nor Japanese intelligence could penetrate because they had not studied the language.11

Cryptographic System

Mechanism

Result

Vulnerability

Enigma (German)

Rotor-based mechanical substitution.13

Broken by Bletchley Park "Bombes".13

Predictable message formats and operator fatigue.

Purple (Japanese)

Stepping-switch machine for diplomatic traffic.12

Broken by U.S. "Magic" before Pearl Harbor.12

Reuse of identical messages in old and new systems.14

Navajo Code

Oral linguistic substitution using indigenous syntax.11

Never broken during WWII.11

Required a limited pool of specialized native speakers.

Vicky with Three Kisses

Propaganda radio using sweet-talk and "lied" scripts.16

Successful demoralization of Nazi troops.16

Risked exposure if the actress was captured or identified.

The historical record suggests that secrecy is a "source of power" that distinguishes between the "privileged elite" of the insiders and the "ignorant" outsiders.17 However, as the world moved into the digital age, this distinction began to blur. The "period of secrecy" surrounding atomic energy in 1945, which prohibited nuclear cooperation even among allies, was the last era where information could be truly bottled through legal fiat.18 The advent of social networking and commercial digital tools has effectively ended this era of absolute containment.

Signalgate: The Erosion of Command Discipline in the 21st Century

The "Signalgate" incident of March 2025 serves as the modern corollary to the Chicago Tribune leak, but with a critical difference: the leak was not perpetrated by a journalist surviving a ship sinking, but by the National Security Advisor himself through a common smartphone application. This event underscores a systemic failure within the second Trump administration to adhere to established military communication protocols in favor of the perceived convenience and "security" of the Signal messaging app.19

The Mechanics of "Houthi PC Small Group"

On March 11, 2025, National Security Advisor Michael Waltz established a Signal group chat to coordinate "Operation Rough Rider," a large-scale campaign against Houthi rebels in Yemen.19 The group included the most senior officials in the U.S. government: Vice President JD Vance, Secretary of State Marco Rubio, Secretary of Defense Pete Hegseth, and CIA Director John Ratcliffe.19 The error occurred when Waltz, attempting to add NSC spokesman Brian Hughes, instead added Jeffrey Goldberg, the editor-in-chief of The Atlantic.19

A forensic investigation later revealed that Waltz had inadvertently saved Goldberg's phone number under Hughes' contact name.19 For several days, Goldberg was an unobserved participant in conversations regarding the timing of airstrikes, target windows, and weapon deployments.19 This was not a sophisticated hack; it was a fundamental failure of contact management in a personal device used for state business.

Operational Transparency and Family Leaks

The leak revealed deeper indiscretions beyond the initial misconfiguration. Investigative journalists reported that Secretary of Defense Pete Hegseth was sharing real-time details of missile strikes in Yemen to a second group chat that included his wife, brother, and personal lawyer.19 This normalization of sharing "live" battlefield data with non-cleared family members represents a complete collapse of the "weather rule" mindset. Whereas a WWII sailor’s letter was scissored for mentioning a cloud, a 21st-century Secretary of Defense was texting the exact launch times of Tomahawk missiles to his family.19

Incident Phase

Date (2025)

Action Taken

Operational Impact

Group Formation

March 11

Waltz creates Signal chat; inadvertently adds Goldberg.19

Non-cleared journalist gains access to NSC deliberative process.

Operational Detail

March 15

Hegseth shares F-18 launch times and bomb impact windows.19

Risk of intercept by Houthi or Iranian SIGINT monitoring Signal traffic.

Internal Friction

March 14

VP Vance asks to delay strikes over oil price concerns.21

Revealed internal administration dissent to an outside observer.

Public Disclosure

March 24

Goldberg publishes redacted transcript in The Atlantic.19

Massive diplomatic and national security scandal; "Signalgate."

Administrative Fallout

May 2025

Waltz reassigned to UN Ambassador; subordinates fired.22

Leadership shakeup in the middle of a conflict with Iran.

The fallout from Signalgate was as much political as it was operational. The use of Signal’s auto-delete function—configured by Waltz to wipe messages after one to four weeks—was flagged as a violation of the Federal Records Act, which requires the preservation of all official communications.19 Furthermore, the incident exposed a "vicious knife-fight" between hawkish officials like Waltz and Rubio and dovish members like Vance and Gabbard on the question of how to handle Iran.22 This internal fragmentation, visible to a journalist in real-time, effectively paralyzed U.S. strategy during a critical maritime chokepoint crisis.22

Technical Hubris and the Fall of Center 795

If Signalgate represents a failure of American political discipline, the Russian "Center 795" blunder of March 2026 represents a failure of professional intelligence tradecraft in the face of linguistic reality. Center 795 was designed to be the Kremlin’s "shadow army"—a new, ultra-secret unit established by General Valery Gerasimov to conduct assassinations and sabotage abroad without the "sloppy tradecraft" that had burned the previous Unit 29155.24

The Google Translate Solution

The unit’s extreme compartmentalization and $1.7 billion clifftop logistical base were undone by a simple language barrier. Denis Alimov, a decorated veteran of the FSB’s elite "Alfa" unit and a key operative in Center 795, was tasked with orchestrating the assassination of Chechen dissidents in Europe.24 He recruited Darko Durovic, a Serbo-Croatian speaker in the U.S., as his primary hitman. Because the two men shared no common language, they utilized Google Translate to bridge the gap in their "operational communication".26

The catastrophic error was the assumption that encryption on the messaging app extended to the translation process. Because Google operates on U.S. servers, the FBI was able to obtain a warrant and access the plaintext translation logs in real-time.25 The "assassination-by-Google" plot provided investigators with legible, timestamped transcripts of murder-for-hire instructions, which were "even better than a wiretap" because they arrived pre-transcribed.26

Mapping the Shadow Army

The exposure of Alimov following his arrest at El Dorado International Airport in Bogota allowed investigators to map the entire organizational structure of Center 795. The unit was not just a hit squad but a "full-cycle" military force of 500 officers, embedded within the Kalashnikov Concern for corporate deniability.24

Directorate

Key Personnel / Features

Specific Departments

Weapons / Equipment

Intelligence

Denis Fisenko (Commander).24

11th (OSINT), 12th (Human Intelligence), 19th (Snipers).24

Orlan-10 UAVs, Eleron-3 drones.24

Assault

FSO & Spetznaz veterans.24

Department 20 (Combat Application).24

Parachute insertion gear; close-protection specialists.24

Combat Support

Heavy warfighting capability.24

Armor, Artillery, EOD, Air Defense.24

T-90A tanks, Smerch 300mm rocket systems.24

Corporate Cover

Embedded in Kalashnikov Concern.26

Staffed as "corporate employees".25

Patriot Park training infrastructure.25

The exposure of Center 795's sniper teams (19th Department) within the Intelligence Directorate revealed their primary purpose: "targeted liquidations" conducted under a veil of corporate deniability.24 The unit’s failure mirrors the historical "loose lips" of WWII, but in this case, the "loose lips" were the binary code of a consumer translation application. The irony remains that an organization designed to be "impossible to detect" was unmasked by a linguistic hurdle that a simpler, traditional human translator could have avoided.26

The Metadata Panopticon: Strava and the Global Elite

The most pervasive threat to modern OPSEC is the voluntary sharing of data through fitness and lifestyle applications. While Signalgate and Center 795 involved specific, high-stakes communication, the "Strava leaks" of 2024–2026 demonstrate how the routine habits of bodyguards and sailors can compromise the location of nuclear aircraft carriers and world leaders alike.

The Charles de Gaulle Location Breach

In March 2026, a young sailor on the French aircraft carrier Charles de Gaulle inadvertently compromised the vessel’s location in a conflict zone.29 By logging a 36-minute run on the ship’s deck and sharing it publicly on Strava, the sailor provided precise GPS coordinates that placed the carrier 62 miles off the coast of Turkey near Cyprus.31 The movement appeared as loops in open water, which investigative journalists from Le Monde easily identified as a carrier’s deck pattern and verified via satellite imagery.29

This occurred just two weeks after French President Emmanuel Macron had deployed the carrier to the Mediterranean amid U.S.-Israeli strikes on Iran.32 The lapse highlighted that even in a state of high military readiness, "digital hygiene" is often secondary to the individual's desire to "feel the burn" and track their fitness goals.29

Presidential Bodyguard Tracking

The vulnerability of the Charles de Gaulle was part of a larger systemic failure identified by Le Monde in late 2024. Journalists found that they could track the locations of world leaders including Joe Biden, Vladimir Putin, and Emmanuel Macron by simply following the Strava accounts of their security details.34

  • U.S. Secret Service: 26 agents were identified with public profiles. One agent’s jog in San Francisco revealed the hotel President Biden stayed at for talks with Xi Jinping in 2023 hours before he arrived.34
  • French GSPR: 12 members were trackable, revealing a private, unscheduled trip Macron took to Honfleur in 2021.35
  • Russian FSO: 6 members logged runs near Putin’s billion-euro Black Sea palace, proving its use by the President despite his denials.34

The investigation used a "fake run" methodology: logging a simulated activity in a restricted area allowed Strava's "segments" and "who else ran here" features to reveal the identities of the security personnel.37 This created a "postliminary" tracking system where any future trip by a leader could be predicted based on the "scouting" runs of their bodyguards.

The Industrialization of Surveillance: Ad-Tech and Pattern of Life

The most complex and legally ambiguous form of modern disclosure is the purchase of "Pattern of Life" (POL) data by government agencies from the commercial "ad-tech" industry. This process represents the final collapse of the WWII-era information control model, where the government is no longer the censor, but the consumer of data that civilians voluntarily—if unwittingly—provide to private corporations.

The ACLU Lawsuit and DHS Data Purchasing

Between 2024 and 2026, the ACLU published documents obtained via FOIA that detailed how Immigration and Customs Enforcement (ICE) and Customs and Border Protection (CBP) circumvented the Fourth Amendment by purchasing location data from brokers like Venntel and Babel Street.38 These agencies argued that because the data was tied to "Mobile Advertising IDs" (MAIDs) rather than names, they did not need a warrant to access it—a "ridiculous technicality" given that MAID-linked data can be "enriched" with personal history to identify an individual’s home, work, and lifestyle.39

Agency

Data Broker

Contract Value

Capability / Purpose

CBP

Venntel

$2,000,000+.39

Tracing devices between U.S. and Mexico.39

CBP

Babel Street

$3,000,000.39

Geofencing "neighborhoods of interest".39

ICE

Penlink

Unspecified (2026).40

Monitoring devices in specific city blocks.39

Secret Service

Babel Street

$600,000.39

Tracking historical locations of border crossers.39

This "end-run" around the Constitution allows the government to create "near perfect surveillance" of the "privacies of life".39 In January 2026, ICE issued an RFI seeking even more expansive data from brokers, including financial and health information, to aid its investigative missions.40 This industrial-scale tracking of Americans' phones renders the traditional "weather rule" obsolete; if the government can buy the historical movement of every device in a city, the silence of the individual is irrelevant.

Conclusion: The New Doctrine of Silence

The transition from the "Loose Lips Sink Ships" era to the "Signalgate" era highlights a fundamental truth: human nature is the primary vulnerability in any security architecture. In the 1940s, the military successfully policed the weather; in the 2020s, it cannot even police its own fitness trackers. The "Signalgate" leak and the Center 795 Google Translate blunder both stem from a belief that commercial "convenience" is a safe substitute for rigid, classified tradecraft.

The modern operative must now navigate a landscape where their "digital exhaust"—their MAID, their Strava profile, and their contact list—is constantly being harvested by both their own government and their adversaries. The future of OPSEC will likely require a return to the absolute "digital silence" of the past, treating a smartphone with the same tactical suspicion as a WWII commander treated a newspaper reporter. Until military and political leaders prioritize security over convenience, the "atmospheric shield" of secrecy will remain a historical relic, replaced by a permanent, metadata-driven transparency.

Works cited

  1. Censoring the Weather During World War II - NOAA VLab, accessed March 21, 2026, https://vlab.noaa.gov/web/nws-heritage/-/censoring-the-weather
  2. During WWII, the U.S. government censored the weather - Popular Science, accessed March 21, 2026, https://www.popsci.com/environment/censor-weather-world-war-2-us/
  3. Copyright by Amber Christine Clift 2017 - Repository Home, accessed March 21, 2026, https://repositories.lib.utexas.edu/bitstreams/1be230ae-ce96-4a75-a451-457c13b47440/download
  4. Newly Discovered Letters Bring New Insight Into the Life of a Civil War Soldier, accessed March 21, 2026, https://www.smithsonianmag.com/smithsonian-institution/newly-discovered-letters-bring-insight-life-civil-war-soldier-180960784/
  5. The Revolutionary War Diary of Moses Sleeper (U.S. National Park Service), accessed March 21, 2026, https://www.nps.gov/articles/000/revolutionary-war-diary-of-moses-sleeper.htm
  6. The New Sherman Letters - AMERICAN HERITAGE, accessed March 21, 2026, https://www.americanheritage.com/new-sherman-letters
  7. WWII Letters: Corporal James. G. Delaney - Warfare History Network, accessed March 21, 2026, https://warfarehistorynetwork.com/article/wwii-letters-corporal-james-g-delaney/
  8. During WW2, what was the purpose of censoring a soldier's mail once it had reached the US? - Quora, accessed March 21, 2026, https://www.quora.com/During-WW2-what-was-the-purpose-of-censoring-a-soldiers-mail-once-it-had-reached-the-US
  9. Secrecy And Leaks: When The U.S. Government Prosecuted The Chicago Tribune, accessed March 21, 2026, https://nsarchive.gwu.edu/briefing-book/intelligence/2017-10-25/secrecy-leaks-when-us-government-prosecuted-chicago-tribune
  10. Episode 5: America's Secrecy Regime - None Of The Above Podcast, accessed March 21, 2026, https://www.noneoftheabovepodcast.org/episodes/s4ep5
  11. CODE SCHOOL: TOP SECRET COMMUNICATIONS DURING WWII, accessed March 21, 2026, https://www.nationalww2museum.org/sites/default/files/2020-04/Elementary%20-%20Code%20School%20Activity%20Guide_0.pdf
  12. The CodeBreakers - Kahn David.pdf - The Swiss Bay, accessed March 21, 2026, https://theswissbay.ch/pdf/Gentoomen%20Library/Cryptography/The%20CodeBreakers%20-%20Kahn%20David.pdf
  13. War of Secrets: Cryptology in WWII > National Museum of the United States Air Force > Display, accessed March 21, 2026, https://www.nationalmuseum.af.mil/Visit/Museum-Exhibits/Fact-Sheets/Display/Article/196193/war-of-secrets-cryptology-in-wwii/
  14. A Brief History of Naval Cryptanalysis - Naval History and Heritage Command - Navy.mil, accessed March 21, 2026, https://www.history.navy.mil/research/library/online-reading-room/title-list-alphabetically/b/a-brief-history-of-naval-cryptanalysis.html
  15. Silent Voices of World War II (U.S. National Park Service) - NPS.gov, accessed March 21, 2026, https://www.nps.gov/articles/000/silent-voices-of-world-war-ii.htm
  16. One of the Allies' Secret Weapons Against the Nazis Was a 21-Year-Old Woman Armed With a Microphone and a Script of Lies - Smithsonian Magazine, accessed March 21, 2026, https://www.smithsonianmag.com/history/allies-secret-weapons-against-nazis-woman-armed-microphone-script-lies-180988094/
  17. Full article: Navigating Secrecy in Innovation: Coping Mechanisms for Public–Private Collaboration in Intelligence and Security - Taylor & Francis, accessed March 21, 2026, https://www.tandfonline.com/doi/full/10.1080/08850607.2025.2490620
  18. The International Atomic Energy Agency's Struggle to Maintain the Confidentiality of Informat - Digital Commons @ Georgia Law, accessed March 21, 2026, https://digitalcommons.law.uga.edu/cgi/viewcontent.cgi?article=1287&context=gjicl
  19. United States government group chat leaks - Wikipedia, accessed March 21, 2026, https://en.wikipedia.org/wiki/United_States_government_group_chat_leaks
  20. Inspector general report raises concerns about Hegseth's use of Signal chat - Al Jazeera, accessed March 21, 2026, https://www.aljazeera.com/news/2025/12/4/inspectorgeneralreportraises-concerns-about-hegseths-use-of-signal-chat
  21. March–May 2025 United States attacks in Yemen - Wikipedia, accessed March 21, 2026, https://en.wikipedia.org/wiki/March%E2%80%93May_2025_United_States_attacks_in_Yemen
  22. What Signalgate tells us about Iran | The Spectator Australia, accessed March 21, 2026, https://www.spectator.com.au/2026/03/what-signalgate-tells-us-about-iran/
  23. From 'Signalgate' to the UN: Why Mike Waltz was 'promoted', not fired, according to US Vice President JD Vance; watch - The Times of India, accessed March 21, 2026, https://timesofindia.indiatimes.com/world/us/from-signalgate-to-the-un-why-mike-waltz-was-promoted-not-fired-according-to-us-vice-president-jd-vance-watch/articleshow/120807834.cms
  24. Lost in translation: How Russia's new elite hit squad was ..., accessed March 21, 2026, https://theins.ru/en/inv/290235
  25. Top Russian Spy Arrested After Planning a Murder Using Google Translate, accessed March 21, 2026, https://united24media.com/latest-news/top-russian-spy-arrested-after-planning-a-murder-using-google-translate-16860
  26. How Russia's elite hit squad was foiled by Google Translate blunder - TVP World, accessed March 21, 2026, https://tvpworld.com/92091959/russias-elite-hit-squad-foiled-by-google-translate
  27. Russia created an elite hit squad to target its opponents abroad. One of its agents was compromised by using Google Translate. - Meduza, accessed March 21, 2026, https://meduza.io/en/feature/2026/03/14/russia-created-an-elite-hit-squad-to-target-its-opponents-abroad-one-of-its-agents-was-compromised-by-using-google-translate
  28. The Kremlin's assassins: how Russia built a killing machine in Europe - L'Europeista, accessed March 21, 2026, https://www.leuropeista.it/en/the-kremlins-assassins-how-russia-built-a-killing-machine-in-europe/
  29. French Sailor Reveals Location of Aircraft Carrier via Strava, accessed March 21, 2026, https://www.bitdefender.com/en-us/blog/hotforsecurity/aircraft-carrier-strava
  30. Strava fitness app reportedly reveals location of France aircraft carrier at sea - The True Story, accessed March 21, 2026, https://thetruestory.news/en/world/story/bd0b75d9-2430-11f1-8443-a8a1590471b5
  31. How a sailor's daily workout gave away French aircraft carrier's location, accessed March 21, 2026, https://www.indiatoday.in/world/story/charles-de-gaulle-aircraft-carrier-location-strava-app-leak-france-navy-officer-workout-iran-middle-east-2884474-2026-03-20
  32. How a French sailor's routine fitness app activity leaked aircraft carrier's location amid West Asia tension - Deccan Herald, accessed March 21, 2026, https://www.deccanherald.com/world/europe/how-a-french-sailors-routine-run-leaked-aircraft-carrier-charles-de-gaulles-location-amid-west-asia-tension-3938514
  33. Jogging slip: Strava leak exposes French warship location, raises security alarm amid Iran war - Telegraph India, accessed March 21, 2026, https://www.telegraphindia.com/world/jogging-slip-strava-leak-exposes-french-warship-location-raises-security-alarm-amid-iran-war/cid/2152323
  34. Investigation tracks heads of state through bodyguards' Strava accounts - Morning Brew, accessed March 21, 2026, https://www.morningbrew.com/stories/track-heads-of-state-bodyguards-strava-accounts
  35. Location of world leaders including Putin, Trump and Macron 'revealed by security teams' Strava' - The Independent, accessed March 21, 2026, https://www.independent.co.uk/world/strava-security-trump-putin-macron-secret-service-b2637282.html
  36. Putin, Trump, Biden and Macron's locations exposed by bodyguards' Strava workouts, accessed March 21, 2026, https://cyclingmagazine.ca/sections/news/putin-trump-biden-and-macrons-locations-exposed-by-bodyguards-strava-workouts/
  37. Running Into Open Secrets: How to Investigate Using the Strava Fitness App, accessed March 21, 2026, https://gijn.org/stories/investigations-using-strava-fitness-app/
  38. ACLU v. Department of Homeland Security (commercial location data FOIA), accessed March 21, 2026, https://www.aclu.org/cases/aclu-v-department-homeland-security-commercial-location-data-foia?document=CBPs-Additional-Production-2024-Reprocessed-Release
  39. DHS is Circumventing Constitution by Buying Data It Would ... - ACLU, accessed March 21, 2026, https://www.aclu.org/news/privacy-technology/dhs-is-circumventing-constitution-by-buying-data-it-would-normally-need-a-warrant-to-access
  40. ICE seeks ad tech data for investigations, raises privacy concerns | brief - SC Media, accessed March 21, 2026, https://www.scworld.com/brief/ice-seeks-ad-tech-data-for-investigations-raises-privacy-concerns