
French sailor reveals Charles de Gaulle's location on Strava
Key Takeaways
- A French sailor publicly logged a Strava run, exposing the Charles de Gaulle's location.
- France said appropriate measures would be taken after the public geolocation leak.
- The carrier was deployed in the eastern Mediterranean northwest of Cyprus.
Security Breach Details
A French naval officer inadvertently exposed the precise location of the Charles de Gaulle aircraft carrier in the eastern Mediterranean by publicly sharing his workout on the Strava fitness app on March 13, 2026.
“France says it's taking “appropriate measures” after a naval officer's use of the Strava exercise app inadvertently enabled journalists to geolocate the aircraft carrier Charles de Gaulle that is in the Mediterranean to help protect French and allied assets and interests during the Iran war”
The officer, identified as 'Arthur' by Le Monde, completed a 35-36 minute run covering 4.3-7.3 kilometers on the deck of the nuclear-powered vessel.

His smartwatch automatically uploaded the activity to his public Strava profile, revealing the carrier's exact position northwest of Cyprus.
The location was approximately 62-100 kilometers from the Turkish coast while the carrier operated in a conflict zone.
While President Macron had announced the deployment on March 3 as 'strictly defensive,' the precise operational location remained classified information.
Strategic Context
The incident occurred amid heightened tensions in the Middle East, where two French military bases had recently been struck by Iranian attacks.
These attacks left one French soldier dead and six wounded, making operational security particularly critical.
The Charles de Gaulle carries 20 fighter jets, two surveillance aircraft, and three helicopters as part of its strike group.
The leak exposed not just the carrier's position but potentially the entire naval task force's movements.
This created a significant strategic advantage for potential adversaries in the conflict zone.
French military officials acknowledged that while the carrier's presence was public, its precise coordinates represented sensitive operational information.
Strava Security Pattern
The Charles de Gaulle leak is part of a troubling pattern of security breaches linked to Strava.
“A few years later, a disinformation watchdog said the app allowed suspicious figures to identify and track security personnel working at secretive bases in Israel”
Le Monde's previous investigations, dubbed 'StravaLeaks,' have revealed compromised security at various military bases worldwide.
The app has exposed American and Russian military bases in Syria, British nuclear bases in Scotland, and numerous other sensitive locations.
Strava's location-sharing feature has also revealed movements of bodyguards protecting world leaders.
These include bodyguards for Joe Biden, Donald Trump, and Vladimir Putin.
One instance revealed the exact hotel where Biden stayed during a 2023 trip to San Francisco.
These incidents highlight how fitness tracking apps can inadvertently create detailed movement logs that reveal operational details.
Military Response
French military authorities responded swiftly to the incident, acknowledging that the sailor's actions violated current digital security protocols.
The Armed Forces General Staff issued a statement confirming the violation and that 'appropriate measures will be taken by the command.'

Military officials emphasized that sailors are regularly trained on 'digital hygiene' and security risks of connected devices.
Different levels of restrictions are applied based on threat assessment within the French Navy.
The leak wasn't an isolated incident - at least one other naval officer was sharing geotagged workouts from active duty ships.
This other sailor posted deck photos and equipment images publicly on Strava.
This pattern suggests systemic issues with military personnel awareness or compliance with digital security protocols.
Technical Mechanism
Technologically, the leak occurred due to three key factors: GPS-enabled smartwatch use, automatic Strava publication, and public profile settings.
“These leaks rely on publicly available data, not system breaches”
The smartwatch recorded precise GPS coordinates during the 35-minute run.

Strava automatically uploaded the data to cloud servers once the device connected to a network.
The officer's public profile settings made the location data immediately visible to anyone with internet access.
The activity in open sea created a distinctive looping pattern indicating movement aboard a large vessel.
Journalists verified the information by cross-referencing Strava data with satellite images.
This demonstrates how personal technology can create significant national security vulnerabilities without proper awareness.
More on Iran

Iran Launches Ballistic Missiles at US-UK Diego Garcia Base in Indian Ocean
49 sources compared

Trump Defends Iran War by Citing Pearl Harbor
12 sources compared

Israel's Defense Minister Warns Israel and United States Will Intensify Attacks on Iran
125 sources compared

Iran Threatens Worldwide Attacks on Tourist Sites
11 sources compared