We live in an era where smartphones are essential tools for communication and documentation. Their use can pose severe risks for photojournalists working undercover, or during nighttime operations. Whether looking to protect your position, or go undetected, the digital footprint left by smartphones can be a liability.
Cover photo by Gilles Lambert
Physical and Positional Dangers
Infrared (IR) and Facial Recognition Flashes
Many modern smartphones use infrared technology for facial recognition. This can be invisible to the human eye but highly visible to night vision and infrared-sensitive devices. Even if you disable face recognition software, your phone might still emit pulses, checking for biometric access. In dark environments, such as night patrols or covert fieldwork, these flashes can reveal your position to those using night-vision optics.
Automatic Light and Screen Exposure
Even a dimly lit phone screen can be visible from a distance in low-light situations. A glance at your phone could give away your location. This is especially dangerous in environments where adversaries are scanning for movement in the dark. Similarly, the automatic LED or screen illuminations when receiving notifications, even briefly, can act as a beacon.

Geotagging and Metadata Risks
How Your Phone Leaks Location Data
Most smartphones automatically tag photos with GPS metadata unless explicitly disabled. When shared via messaging apps or social media, this metadata can reveal your exact location. This is even if it’s not immediately visible to the average viewer. Platforms like Instagram and Facebook store location information even after users disable geotagging on their devices.
Wi-Fi and Bluetooth Signals
Even when you’re not actively using your phone, it constantly searches for nearby networks and Bluetooth connections. These pings can be intercepted by hostile actors using Wi-Fi sniffing tools or IMSI catchers (fake cell towers). This allows them to track and log your presence. In high-risk zones, intelligence agencies, military forces, or cyber-savvy militias use these tools to locate and identify threats—including journalists.

Network and Communication Tracking
Cell Tower Triangulation
Even if GPS is disabled, mobile carriers still track your location through cell tower triangulation. Authorities or adversaries can request or intercept this data to pinpoint your movements. If you’re working undercover, carrying a smartphone—even if powered off—can provide adversaries with a digital trail of where you’ve been.
Cloud Backups and Remote Data Exposure
If your smartphone uploads photos to cloud storage automatically, adversaries could intercept or access those backups. Even encrypted services can be breached under extreme surveillance. Secure communication apps like Signal provide disappearing messages, for example. Using standard messaging apps or storing sensitive information on your device puts your sources and yourself at risk.

Best Practices for Staying Undetected
1. Use Burner Phones or “Dumb” Phones – A prepaid phone without smart features significantly reduces tracking risks.
2. Disable Facial Recognition & IR Sensors – Check your settings and turn off any biometric authentication that may trigger IR emissions.
3. Turn off Wi-Fi, Bluetooth, and Location Services—Even in airplane mode, some devices continue to broadcast signals.
4. Use Secure Communication Tools—When handling sensitive information, Stick to encrypted apps like Signal and avoid standard SMS and email.
5. Scrub Metadata from Images Before Sharing – Use tools like Exif Purge or Scrambled Exif to remove location data before sending files.
6. Limit Social Media Usage in the Field – Avoid posting in real-time, as platforms can store and share geolocation details.

Questions
– How can photojournalists stay hidden in hostile environments?
Avoid using smartphones, disable tracking features, use encrypted communication. Also use physical cover to prevent exposure. Examples: Journalists covering protests in Iran have had their locations tracked through phone metadata.
– Does Face ID reveal your location at night?
Yes, Face ID and similar biometric features use infrared, which can be detected by night-vision cameras. Example: Military forces in Ukraine have used IR-detecting drones to spot hidden operatives.
– How does smartphone geotagging put journalists at risk?
Geotagging embeds precise location data into images, making it easy for adversaries to track movement. Example: During Russia’s attack on Ukraine, leaked phone metadata helped locate resistance groups.
– Can Wi-Fi and Bluetooth signals be used to track you?
Yes, phones constantly ping for networks, which adversaries can intercept. Example: Israeli forces have used Wi-Fi sniffers to track journalists and activists in Gaza.
– What is an IMSI catcher and how does it work?
A fake cell tower that intercepts calls and messages, identifying device locations. Example: Used in Belarus to track opposition journalists.
– How do night-vision devices detect smartphones?
Many night-vision optics detect IR emissions from smartphones. Example: In Afghanistan, U.S. forces used IR scanners to track Taliban movements at night.
– What are the best burner phones for journalists?
Phones like the Nokia 105 or Alcatel 1066D are ideal due to their lack of smart features. Example: War correspondents in Syria used basic burner phones to avoid tracking.
– How can I remove metadata from my smartphone photos?
Use apps like ExifTool or built-in settings to strip metadata. Example: Activists in Hong Kong used metadata scrubbing tools to prevent police from tracking protest locations.
By understanding these risks and taking preventative measures, photojournalists can better protect themselves and their sources while documenting critical stories. Awareness is the first step in staying safe in the digital age.