Your Phone Is Broadcasting Your Life. A French Sailor Proved It — and So Are You.
- Katherine Blastos
- 2 days ago
- 7 min read
On March 13, 2026, a French naval officer known only as "Arthur" went for a morning run on the deck of the aircraft carrier Charles de Gaulle. He logged 7 kilometers on his smartwatch. The data uploaded automatically to Strava. His profile was public. By that afternoon, reporters at Le Monde had used his GPS loops — the circular pattern of someone running laps on a moving ship — to pinpoint the 42,000-tonne nuclear-powered vessel to a location roughly 100 kilometers south of Turkey and northwest of Cyprus. The ship was deployed to the eastern Mediterranean in an active conflict with Iran. Iranian-aligned forces had already killed a French soldier in a drone strike the day before.
Arthur didn't do anything unusual. He used a fitness app on his personal phone. He kept his profile on the default settings. He went for a run. Millions of people do exactly that, every single day.
This article is not about a sailor or a warship. It is about you — your family, your home, your business, and the quiet, continuous stream of information you are broadcasting to the world without ever noticing it's happening.
You've Already Built the Profile for Them
The data that creates genuine physical risk — the kind that enables theft, stalking, kidnapping, home invasion, or corporate espionage — is almost never the post itself. It is the GPS coordinates embedded invisibly in the photo. The check-in that confirms you are away from home. The fitness route that begins and ends at your front door. The pattern that emerges when someone spends two weeks mapping your public activity against your address, your schedule, and your relationships.
No single post exposes you. The danger is in combination. Your LinkedIn confirms your employer and title. Your Instagram shows your vehicle, your neighborhood, and your face. Your Strava reveals your morning route and your home address. Your Facebook check-in confirms you'll be at dinner until 9pm. Individually, each appears harmless. Together, they constitute a surveillance package that a determined person can assemble with a browser and an afternoon.
This is precisely the technique Le Monde used to find the Charles de Gaulle — cross-referencing a GPS dataset with a satellite image to confirm a location. The same methodology applied to your public profiles yields your home address, daily schedule, vehicle, family composition, and travel patterns. The mechanism is identical. Only the scale is different.
And this isn't new. In 2024, the same newspaper used the same technique to track Strava profiles of personal protection agents working for the presidents of France, the United States, and Russia. The agents' public fitness data revealed the movements of three sitting heads of state. If it can happen to the security details of the most protected individuals on the planet, it can happen to anyone.
Family Safety: The People Around You Are the Exposure
For parents and families, the risk is more complicated because the people most exposed are often the least equipped to understand it.
A back-to-school photo with a school crest visible is a searchable identifier. A photo at a corner with a street sign in the background is a coordinate. A teenager's public Instagram with daily after-school posts from the same location is a schedule. These are the documented mechanics of how targeted crimes against children are planned and executed.
The exposure also extends to the household ecosystem. A parent may maintain careful digital hygiene. But the housekeeper who geotags a post from the kitchen, the teenager whose location settings are on by default, the spouse who checked in at the airport — each creates an independent exposure vector. Comprehensive family security requires a household-wide conversation, not just individual awareness.
What to do: Never post children's school uniforms, building exteriors, or drop-off locations. Audit your children's profiles — a teenager with a public account and active location-sharing is an exposure vector for the entire household. Establish one consistent rule: nothing about home, school, routine, or location is posted in real time. Brief household staff — a domestic employee who geotags a post at your residence has disclosed your home address regardless of your own privacy settings.
Business Safety: Your Public Profile Is an Intelligence Asset — for Your Adversaries
For businesses, the exposure compounds because professional identity is public by design. Executives maintain LinkedIn profiles. Companies post on Instagram. Employees share from conferences. All normal and valuable. All, from a security standpoint, a continuous intelligence feed.
Consider what a determined competitor, a foreign intelligence service, or a criminal organization can learn from two weeks of open-source research on a mid-sized American company. LinkedIn profiles provide an org chart and individual travel schedules. Conference posts identify which clients are being pursued. Employee profiles reveal the office location and workspace layout. A CEO's Strava profile reveals their home neighborhood, morning schedule, and the route they take alone.
None of this requires a breach. It requires a browser and a notepad. An executive's professional profile is the anchor for a much broader intelligence picture — and combined with personal social media maintained with less discipline, it provides home neighborhood, vehicle, family composition, and daily routine. A protection posture that addresses only the physical environment while leaving the principal's digital profile unreviewed has closed the wrong door.
UHNWI and Celebrities: When Visibility Is the Target
For ultra-high-net-worth individuals and public figures, the risk is different in magnitude, consequence, and the sophistication of threats it attracts.
The Kardashian Paris robbery of 2016 remains the industry's case study: her social media provided a near real-time broadcast of her location, the jewelry she was wearing, and her security posture. The robbers were not sophisticated hackers. They were people who paid attention to what was posted publicly. The investigation found her accounts had been monitored in the weeks before the attack.
For UHNWI families specifically, the most dangerous exposure is often not the principal's account — it is everyone around them. A family member with a casual social presence, a household employee who posts from the property, a child at boarding school whose Instagram is public — each creates a thread that leads back to the principal. The Charles de Gaulle was not exposed by a command decision. It was exposed by one junior officer's personal device and default settings. Comprehensive security accounts for the entire environment.
Five Things to Do Before You Post Again
Set your fitness apps to private today. Strava, Garmin, Apple Fitness — activity, routes, and profile visibility should be private or friends-only. Disable route-sharing. If your runs start or end at your home, that data should never be publicly accessible.
Strip location data from photos before posting. On iPhone: Share → Options → disable Location. On Android: Camera Settings → disable location tags. Four seconds. Eliminates one of the most reliable mechanisms for establishing residential addresses from social media.
Set all social app location permissions to "Never." An app with "While Using" access logs your location every time you open it. Set every social platform to never access location data at the system level.
Implement a real-time posting delay. Post vacation photos after you return. Post conference appearances after you've left. Post travel plans once you're home. The delay costs nothing. It eliminates the broadcast of an unoccupied home and a predictable schedule.
Conduct a 30-minute audit of your own public profile. Search your name, look at your grid as a stranger would, and ask: Does this tell someone where I live? What time I leave? What I own? Where my children go to school? What you find is what a threat actor already has.
Arthur did nothing wrong by ordinary standards. He logged a workout. His phone uploaded it. His settings were default. Thirty-five minutes of data was enough to locate a nuclear warship in an active war zone.
You are not a nuclear warship. But the data your devices generate every day is equally available to anyone who wants to find it. The difference is that his exposure made international news. Most don't. They result in a burglary while you're posting from Florence, a stalker who already knows your jogging route, or a threat actor who built a profile on your family six months before anything happened.
The solution is not to disappear from social media. It is to apply the same situational awareness to your digital environment that you would to your physical one.
📞 970-989-4610
📍 P.O. Box 8604, Aspen, CO 81612
Frequently Asked Questions
How did a fitness app expose a nuclear aircraft carrier? A French naval officer logged a run on the deck of the Charles de Gaulle on March 13, 2026. His Strava profile was public. His GPS route showed tight circular loops consistent with running laps on a ship's deck, in the Mediterranean Sea. Le Monde overlaid that data with a European Space Agency satellite image from the same morning and confirmed the carrier's position. No technical intrusion was required. The data was publicly available by default.
Is this actually a risk for private individuals? Yes, and the mechanism is identical — the consequences differ in magnitude. For private individuals, risks include burglary timed to a posted vacation, stalking enabled by a public fitness route, and targeted harassment using aggregated location data. For executives and UHNWI, those risks extend to kidnap-for-ransom, corporate espionage, and threats against family members. The techniques that exposed a nuclear warship and the protection details of three sitting presidents are available to anyone with an internet connection.
What does a Vertex digital exposure review include? We map what is actually publicly indexed and accessible about you, your family, and your organization — including data you've forgotten, data shared by others that references you, historical posts, and metadata embedded in content you've published. From that baseline, we identify the highest-risk gaps and close them in priority order, beginning with exposures that present the most immediate physical risk. The goal is not to eliminate your digital presence — it is to ensure that what is shared publicly is intentional.
Why does Vertex address digital exposure as part of physical security? Because in practice they are not separate. A protection detail that controls the physical environment but allows the principal to broadcast their real-time location on social media has secured half of the problem. The Charles de Gaulle — surrounded by an armed escort group, operated by one of the world's most capable navies — was located using a free consumer app and a satellite image. The vector was digital. The exposure was physical. Security planning must account for both.
Vertex Security Services is a woman-owned, Colorado-based security company headquartered in Aspen, providing executive protection, armed security, digital exposure review, school security, event security, and threat vulnerability assessments nationwide.

Comments