French sailor reveals Charles de Gaulle's location on Strava
Image: Ynetnews

French sailor reveals Charles de Gaulle's location on Strava

21 March, 2026.Iran.30 sources

Key Takeaways

  • A French sailor publicly logged a Strava run, exposing the Charles de Gaulle's location.
  • France said appropriate measures would be taken after the public geolocation leak.
  • The carrier was deployed in the eastern Mediterranean northwest of Cyprus.

Security Breach Details

A French naval officer inadvertently exposed the precise location of the Charles de Gaulle aircraft carrier in the eastern Mediterranean by publicly sharing his workout on the Strava fitness app on March 13, 2026.

France says it's taking “appropriate measures” after a naval officer's use of the Strava exercise app inadvertently enabled journalists to geolocate the aircraft carrier Charles de Gaulle that is in the Mediterranean to help protect French and allied assets and interests during the Iran war

1News1News

The officer, identified as 'Arthur' by Le Monde, completed a 35-36 minute run covering 4.3-7.3 kilometers on the deck of the nuclear-powered vessel.

Image from 1News
1News1News

His smartwatch automatically uploaded the activity to his public Strava profile, revealing the carrier's exact position northwest of Cyprus.

The location was approximately 62-100 kilometers from the Turkish coast while the carrier operated in a conflict zone.

While President Macron had announced the deployment on March 3 as 'strictly defensive,' the precise operational location remained classified information.

Strategic Context

The incident occurred amid heightened tensions in the Middle East, where two French military bases had recently been struck by Iranian attacks.

These attacks left one French soldier dead and six wounded, making operational security particularly critical.

Image from Associated Press
Associated PressAssociated Press

The Charles de Gaulle carries 20 fighter jets, two surveillance aircraft, and three helicopters as part of its strike group.

The leak exposed not just the carrier's position but potentially the entire naval task force's movements.

This created a significant strategic advantage for potential adversaries in the conflict zone.

French military officials acknowledged that while the carrier's presence was public, its precise coordinates represented sensitive operational information.

Strava Security Pattern

Le Monde's previous investigations, dubbed 'StravaLeaks,' have revealed compromised security at various military bases worldwide.

The app has exposed American and Russian military bases in Syria, British nuclear bases in Scotland, and numerous other sensitive locations.

Strava's location-sharing feature has also revealed movements of bodyguards protecting world leaders.

These include bodyguards for Joe Biden, Donald Trump, and Vladimir Putin.

One instance revealed the exact hotel where Biden stayed during a 2023 trip to San Francisco.

These incidents highlight how fitness tracking apps can inadvertently create detailed movement logs that reveal operational details.

Military Response

French military authorities responded swiftly to the incident, acknowledging that the sailor's actions violated current digital security protocols.

The Armed Forces General Staff issued a statement confirming the violation and that 'appropriate measures will be taken by the command.'

Image from BFMTV
BFMTVBFMTV

Military officials emphasized that sailors are regularly trained on 'digital hygiene' and security risks of connected devices.

Different levels of restrictions are applied based on threat assessment within the French Navy.

The leak wasn't an isolated incident - at least one other naval officer was sharing geotagged workouts from active duty ships.

This other sailor posted deck photos and equipment images publicly on Strava.

This pattern suggests systemic issues with military personnel awareness or compliance with digital security protocols.

Technical Mechanism

Technologically, the leak occurred due to three key factors: GPS-enabled smartwatch use, automatic Strava publication, and public profile settings.

These leaks rely on publicly available data, not system breaches

BitdefenderBitdefender

The smartwatch recorded precise GPS coordinates during the 35-minute run.

Image from Bitdefender
BitdefenderBitdefender

Strava automatically uploaded the data to cloud servers once the device connected to a network.

The officer's public profile settings made the location data immediately visible to anyone with internet access.

The activity in open sea created a distinctive looping pattern indicating movement aboard a large vessel.

Journalists verified the information by cross-referencing Strava data with satellite images.

This demonstrates how personal technology can create significant national security vulnerabilities without proper awareness.

More on Iran