In modern warfare, not only equipment and weapons, but also information are becoming important weapons. The Land Forces of the Armed Forces of Ukraine page has published a video that emphasizes the threats that arise due to non-compliance with cyber hygiene by servicemen. In particular, smartphones can become a real «digital vulnerability», which puts not only the owner of the device, but also his comrades in danger.
This was reported by the Land Forces of the Armed Forces of Ukraine.
A soldier's smartphone is one of the most vulnerable points in cyberspace. The enemy can use mobile devices to collect intelligence, track whereabouts, intercept conversations, and even influence the morale of military personnel.
Main threats and recommendations:
Tracking whereabouts:
- Smartphones constantly transmit data via GPS, mobile networks, Wi-Fi, and Bluetooth.
Recommendation: Turn off GPS and Bluetooth in a combat zone, avoid connecting to unknown Wi-Fi networks.
- Interception of communications:
IMSI-catcher technology (fake base stations) allows the enemy to intercept calls and SMS.
Unprotected messengers can become a source of leakage of confidential information.
Recommendation: Use only secure communication channels, avoid personal phone conversations on the front line.
- Photos and metadata:
Photos taken on a smartphone contain GPS coordinates, device model, and other metadata.
The enemy can track the location of units through this data.
Recommendation: Turn off geolocation for the camera and delete metadata before publishing the photo.
- Cyberphishing and infected files:
Forged letters and messages may contain malware.
Through infected files, the enemy gains access to devices.
Recommendation: Do not open suspicious links or files from unknown senders.
- Social networks:
The enemy tracks military groups on social networks, analyzing activity to gather information.
Recommendation: Limit the use of social networks while on duty, avoid postings with geotags and personal information.
- Physical threat:
In case of capture or loss of the device, all data may fall into the enemy's hands.
Recommendation: Use two-factor authentication and set up automatic data deletion in case of loss of the device.
A soldier's smartphone — is not just a means of communication, but a potential risk to the security of the entire unit. Best practice — completely abandoning the use of civilian devices in a combat zone or strictly adhering to the rules of cyber hygiene. Remember: following simple rules can save lives.