⚓️ €5 tracker, €500M warship, zero surprises for anyone doing OSINT.
Last week, Dutch broadcaster Omroep Gelderland tracked the location of Zr. Ms. Evertsen, a Dutch air-defense frigate escorting France’s Charles de Gaulle carrier in the eastern Mediterranean, by mailing a generic Bluetooth tracker (basically a cheap AirTag clone, the kind you buy on AliExpress for five euros) inside a greeting card via military postal service. The tracker piggybacked on Apple’s Find My network, relaying its position through any nearby iPhone. From the sorting center in the Netherlands to Crete to 24 hours at sea, the frigate’s route was mapped in real time. The security establishment panicked. Defensie banned greeting cards containing batteries from being sent to the ship. The minister briefed parliament. But this isn’t news. It’s confirmation.The Evertsen was trackable from the moment it left Den Helder. You could find that ship without the tracker. Most military vessels operating outside active conflict zones are already fully exposed through public infrastructure: AIS broadcasts (MarineTraffic, VesselFinder), crew social media leakage (Strava, LinkedIn), port webcams, satellite imagery, and vessel registries. The Bluetooth story got traction because it’s visceral. A postcard, five euros, a journalist. It feels like a breach because it is one. But it’s a symptom. The disease is operational security built on the assumption that a modern warship can hide in the most observed maritime zone on the planet. It can’t. For compliance and intel professionals: this is a live case study in exposure collapse. The infrastructure