Hacker News new | past | comments | ask | show | jobs | submit login

How does it matter where those videos were shared? Material is either classified or unclassified, it doesn't matter if the WarThunder forums (for example) are moderated by US nationals or not.



It's not about where the videos are posted, it's about having apps that collect exact GPS position of smartphones that soldiers carry while the position of the ships they are on is classified. The fact that there's videos is just the "proof" that they have installed such apps that exfiltrate things like their ___location, for example.

Famously, soldiers wanted to use strava in secret military bases: https://www.theguardian.com/world/2018/jan/28/fitness-tracki...


If you want to secure sailors' phones you are going to have to do a lot more, and at the same time much less, than ban or transfer the ownership of one single app that happens to be used by over a hundred million civilians.


GasBuddy (and Life360) just sold that same ___location data to brokers, which Allstate bought and used to adjust premiums. Practically every app that is given access to ___location info is selling it, and it's widely available to anyone with the money to buy.

Maybe we should have some sort of General Data Protection Regulation law instead of hand-wringing about social media.


GasBuddy, at least, said that they could (read: would) sell the ___location data that they collected after opt-in. It was part of the agreement.

I can't imagine a world where it would be illegal for two parties to agree to sell the ___location data that one of them generates.


That’s the world we live in today. Under many countries’ privacy laws, it’s not legal to sell PII to a third party that you collected for a specific other purpose (e.g., fulfilling the primary purpose of the app). The problem is that they do it anyways.


What problem?

If I agree to let FantasyCorp sell my ___location data, and then they follow through with our agreement and actually sell it, then there's no problem here that I can see.


Why are soldiers allowed to bring GPS-enable consumer smartphones along with them on top-secret deployments in the first place?


It’s not top secret deployments, it’s any deployments. All deployments need to maintain a level of operational security. Also if you expect a bunch of people in the 18-29 age range to go without internet for 9 months to 2 years, you’re kidding yourself. The tradeoff is between operational security and morale and if you’re in military leadership, you really don’t want unhappy troops on your hands.


I mean, I do completely expect deployed military personnel to adhere to rules and limitations that are much more rigorous than those they'd experience in civilian life.

I'd be astonished if I learned that soldiers on duty were totally free to do as they please the expense of operational security simply because that's what people in their broad demographic category are accustomed to.

I'd be equally astonished if I found that military recruitment was based on enlisting cross-sectional samples of demographic categories, without regard for the capacities and attitudes of the specific individuals seeking to join. I know for a fact that people are rejected for enlistment for all sorts of reasons.

And I'm sure that the military can find ways of enabling deployed personnel to use the internet without sacrificing security or oversight -- for example by requiring them to use secured military-issue computers and smartphones, or by having an inspection or vetting process for hardware and software when soldiers want to use their own devices.

I hope you also acknowledge the absurdity of suggesting that the government should apply essentially the same restrictions to the whole of society that the military couldn't apply within its own sphere of control.


> And I'm sure that the military can find ways of enabling deployed personnel to use the internet without sacrificing security or oversight -- for example by requiring them to use secured military-issue computers and smartphones, or by having an inspection or vetting process for hardware and software when soldiers want to use their own devices.

Of this we are in 100% agreement. It’s totally doable, but I am observing that today it is not a solved problem in the US military.

> I hope you also acknowledge the absurdity of suggesting that the government should apply essentially the same restrictions to the whole of society that the military couldn't apply within its own sphere of control.

I’m a little confused about the wording of this but I am reading this as saying that the military should be able to apply its own standards that are stricter than what civilians are accustomed to. I agree, and it does. But I’m suggesting that it doesn’t happen in a vacuum and that enforcement is never perfect. A blanket ban on personal devices (I’m positive this has been tried before) would both be unpopular and difficult to enforce. It would be a mistake to discount the cost of poor morale. And it would be a mistake to ignore the outsized effect that poor morale has on middle management — the ones who are responsible for enforcing said rules.

I hope it’s clear that my commentary is entirely descriptive and not prescriptive. Full disclosure: I’m former US military enlisted and also currently working in a space adjacent to improving operational security.


You're constructing a straw man without being curious about the things you yourself are missing.

Or in HNism, you're "Why don't they just..." without considering the reasons those solutions might be more challenging than they first appear.

I suggest you read parent comment about balance and tradeoffs inherent in forward deployment again.


> You're constructing a straw man without being curious about the things you yourself are missing.

Could you point out the straw man in question? I feel like everything I posted above is a direct response to arguments I gleaned from your previous comment, and certainly didn't intentionally attribute any argument to you that I didn't think you were actually making.

> I suggest you read parent comment about balance and tradeoffs inherent in forward deployment again.

I've reread it a couple of times, and I'm afraid I'm not seeing any hidden propositions in it that I missed the first time around. Could you be more explicit about what you're getting at?

My comment about finding ways to enable internet access in a more controlled way was specifically targeting your argument about the security vs. morale tradeoff, and my point about the absurdity of trying to make that tradeoff for society as a whole in a scenario where you imply the military can't make it for its own operations still seems to apply here.


> Could you point out the straw man in question?

>> I'd be astonished if I learned that soldiers on duty were totally free to do as they please the expense of operational security

The post you were replying to didn't suggest anything about total freedom. You're exaggerating their words to make your argument easier.

>> I'd be equally astonished if I found that military recruitment was based on enlisting cross-sectional samples of demographic categories

Given initial enlistment age ranges between 17 and 30/40 [0], you get cohorts from specific generations.

Kids who are 17 now were born ~2008, which is just starting to be kids with smartphones and mobile devices their entire lives.

No cross-sectioning required: just upper and lower age limits.

>> And I'm sure that the military can find ways of enabling deployed personnel to use the internet without sacrificing security or oversight

I'm going to assume you're honestly ignorant of military networks and field device management at scale.

The military runs segregated networks. Secure networks require approved devices; those devices are extremely locked down. There are often also public internet networks for MWR reasons. Unmanaged devices can be used on those networks. Furthermore, in most non-naval deployments, terrestrial cellular data networks are also accessible.

>> for example by requiring them to use secured military-issue computers and smartphones, or by having an inspection or vetting process for hardware and software when soldiers want to use their own devices.

Military IT is already overloaded managing the vast number of secure devices and networks, so having them manage consumer devices in any way is a non-starter.

For scale context, the DoD PKI includes ~4 million active CAC cards. [1]

Unmanaged consumer devices + CAC are also often used for less-privileged interaction with the military (e.g. HR functions).

> My comment about finding ways to enable internet access in a more controlled way was specifically targeting your argument about the security vs. morale tradeoff

And the responses that you're getting are that these are non-trivial problems for real-world reasons.

Furthermore, you seem to have a lack of understanding about how much it sucks to be stuck in a forward base, and how important maintaining morale is to command authority and force effectiveness.

PS: Also, look at user names. I'm not the author of the original comment you replied to.

[0] https://www.usa.gov/military-requirements

[1] https://en.m.wikipedia.org/wiki/Common_Access_Card


Because consumer smartphones are a cheap and logistics-light way to improve morale on deployments.

It's not easy to put a McDonald's in the middle of the desert.


I'm sure there are many other cheap and easy ways to improve morale on deployments, but that many of those options are eschewed and/or only offered with oversight because they would otherwise risk operational security.

I'm not sure what to make of the argument that the military is unable to find any alternative to consumer smartphones without even RMM implemented as a means of providing for troop morale, therefore the government should regulate social media for the entirety of society as a means to ensure the security of military maneuvers. This just sounds nuts to me.


I'm going to try to put this in as few words as possible.

>> Why are soldiers allowed to bring GPS-enable consumer smartphones along with them on top-secret deployments in the first place?

That was your original question.

It wasn't 'Should we ban TikTok to enhance military security?'

When people answered your original question with relevant points, you reached back to banning TikTok.


This entire conversation is about the TikTok ban. My question about why deployed troops are allowed to use social media apps on consumer devices was in response to preceding comments insinuating that banning TikTok is justifiable in light of its potential to damage operational security if military personnel are using it in the field, and was targeted at understanding the implied premise that the problem couldn't be solved by much more proximate, narrowly tailored approaches.


You probably should have phrased your question differently, then.

It sounded like you just didn't understand why soldiers are allowed to bring GPS-enable consumer smartphones along with them on deployments.


Are ship locations classified? I doubt China has difficulty keeping track. They have satellites too.


Generally, no. Specifically, yes.

https://news.usni.org/category/fleet-tracker

The more valuable signal from app data would likely be op tempo and what phase of a deployment / mission a ship is in.

Aside from inferred reasons for changes in patterns of behavior, one going emcon and suddenly dropping all users off an app means something.

Also, modern satellites are great, but even carrier battle groups are really small in the Pacific.


App usage not only leaks ___location, but number of troops; something which is not readily detectable by satellite.


Wouldn’t the crew of a ship be pretty constant though, for this example?


The crew would be relatively constant, but ships also carry attachments that are based on the types of missions they are going to complete. So the actual number of passengers would vary.


The Onion Router was invented by the Navy to make ship ___location tracking hard with visibility of some of the network, so it's classified at times. More importantly, just because you have satellites doesn't mean that it's easy to pick all of that out all the time or to be entirely certain of which ship/which mission, etc. Making it harder is better even if it can't be made impossible outside of subs.


They almost certainly are while on deployment, despite it being really obvious where a ship is.


Oceans are vast, sometimes there are clouds and storms.


Clouds and storms don’t really help you with a SAR satellite.




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: