# Bluetooth tracker mailed to Dutch warship exposes location for 24 hours, prompting security review

_Saturday, April 18, 2026 at 10:10 PM EDT · Cybersecurity · Latest · Tier 2 — Notable_

![Bluetooth tracker mailed to Dutch warship exposes location for 24 hours, prompting security review — Primary](https://cdn.mos.cms.futurecdn.net/mrDHs97dg7kKm8H7v2ZAUi-2560-80.jpg)

A Dutch warship's location was exposed for 24 hours after a journalist mailed a postcard containing a hidden Bluetooth tracker to the vessel, highlighting vulnerabilities in naval operational security.

The HNLMS Evertsen, a $585 million air-defense frigate part of a NATO carrier strike group centered on the French carrier Charles de Gaulle, received the postcard after the Dutch Ministry of Defense published instructions online for communicating with personnel aboard naval ships. Dutch journalist Just Vervaart of regional media network Omroep Gelderland followed the published directions and concealed a tracker in mailed correspondence.

The tracker allowed monitoring of the ship's movements for approximately one day as it sailed from Heraklion, Crete, toward Cyprus. While only tracking the single vessel, knowledge of its position as part of a carrier strike group in the Mediterranean could have exposed the entire fleet to targeting, according to security analysts.

Navy officials discovered the device within 24 hours during mail sorting and disabled it. In response, Dutch authorities have banned electronic greeting cards on ships, which unlike packages were not subject to X-ray screening. The incident reveals how low-cost consumer tracking technology. Bluetooth trackers like Apple AirTags cost around $29, with generic versions available for as little as $10 for two. can compromise military security without requiring physical access to vessels.

This is not the first operational security lapse involving NATO naval forces. Last month, a French officer aboard the Charles de Gaulle posted running data to Strava that revealed the carrier's Mediterranean location through open-source intelligence methods. In 2024, the USS Manchester, a U.S. Navy littoral combat ship, was found to have an unauthorized Starlink terminal installed for six months before discovery; sailors had used the covert internet connection, labeled "STINKY," while at sea.

Military analysts note that seemingly innocuous technologies. social media check-ins, fitness tracking apps, and consumer tracking devices. create open-source intelligence vulnerabilities by revealing personnel locations, schedules, and habits. While such data exposure may pose minimal risk to civilians, it provides adversaries with valuable information for confirming or inferring military movements and capabilities.

## Sources

- [Tom's Hardware](https://www.tomshardware.com/tech-industry/cyber-security/bluetooth-tracker-hidden-in-a-postcard-and-mailed-to-a-warship-exposed-its-location-a-eur5-gadget-put-a-eur500-million-dutch-ship-at-risk-for-24-hours)

---
Canonical: https://techandbusiness.org/newswire/6IFqLXQK07mFWbhNIecYch
Retrieved: 2026-04-19T05:18:40.818Z
Publisher: Tech & Business (techandbusiness.org)
