Why Using Your Smartphone is Dangerous if You’re Trying to Stay Hidden as a Photojournalist

We live in an era where smartphones are essential tools for communication and documentation. Their use can pose severe risks for photojournalists working undercover, or during nighttime operations. Whether looking to protect your position, or go undetected, the digital footprint left by smartphones can be a liability.

Cover photo by Gilles Lambert

Physical and Positional Dangers

Infrared (IR) and Facial Recognition Flashes

Many modern smartphones use infrared technology for facial recognition. This can be invisible to the human eye but highly visible to night vision and infrared-sensitive devices. Even if you disable face recognition software, your phone might still emit pulses, checking for biometric access. In dark environments, such as night patrols or covert fieldwork, these flashes can reveal your position to those using night-vision optics.

Automatic Light and Screen Exposure

Even a dimly lit phone screen can be visible from a distance in low-light situations. A glance at your phone could give away your location. This is especially dangerous in environments where adversaries are scanning for movement in the dark. Similarly, the automatic LED or screen illuminations when receiving notifications, even briefly, can act as a beacon.

Onur Binay

Geotagging and Metadata Risks

How Your Phone Leaks Location Data

Most smartphones automatically tag photos with GPS metadata unless explicitly disabled. When shared via messaging apps or social media, this metadata can reveal your exact location. This is even if it’s not immediately visible to the average viewer. Platforms like Instagram and Facebook store location information even after users disable geotagging on their devices.

Wi-Fi and Bluetooth Signals

Even when you’re not actively using your phone, it constantly searches for nearby networks and Bluetooth connections. These pings can be intercepted by hostile actors using Wi-Fi sniffing tools or IMSI catchers (fake cell towers). This allows them to track and log your presence. In high-risk zones, intelligence agencies, military forces, or cyber-savvy militias use these tools to locate and identify threats—including journalists.

Luke Pamer

Network and Communication Tracking

Cell Tower Triangulation

Even if GPS is disabled, mobile carriers still track your location through cell tower triangulation. Authorities or adversaries can request or intercept this data to pinpoint your movements. If you’re working undercover, carrying a smartphone—even if powered off—can provide adversaries with a digital trail of where you’ve been.

Cloud Backups and Remote Data Exposure

If your smartphone uploads photos to cloud storage automatically, adversaries could intercept or access those backups. Even encrypted services can be breached under extreme surveillance. Secure communication apps like Signal provide disappearing messages, for example. Using standard messaging apps or storing sensitive information on your device puts your sources and yourself at risk.

Mael Balland

Best Practices for Staying Undetected

1. Use Burner Phones or “Dumb” Phones – A prepaid phone without smart features significantly reduces tracking risks.

2. Disable Facial Recognition & IR Sensors – Check your settings and turn off any biometric authentication that may trigger IR emissions.

3. Turn off Wi-Fi, Bluetooth, and Location Services—Even in airplane mode, some devices continue to broadcast signals.

4. Use Secure Communication Tools—When handling sensitive information, Stick to encrypted apps like Signal and avoid standard SMS and email.

5. Scrub Metadata from Images Before Sharing – Use tools like Exif Purge or Scrambled Exif to remove location data before sending files.

6. Limit Social Media Usage in the Field – Avoid posting in real-time, as platforms can store and share geolocation details.

Hans Vivek

Questions

How can photojournalists stay hidden in hostile environments?

Avoid using smartphones, disable tracking features, use encrypted communication. Also use physical cover to prevent exposure. Examples: Journalists covering protests in Iran have had their locations tracked through phone metadata.

Does Face ID reveal your location at night?

Yes, Face ID and similar biometric features use infrared, which can be detected by night-vision cameras. Example: Military forces in Ukraine have used IR-detecting drones to spot hidden operatives.

How does smartphone geotagging put journalists at risk?

Geotagging embeds precise location data into images, making it easy for adversaries to track movement. Example: During Russia’s attack on Ukraine, leaked phone metadata helped locate resistance groups.

Can Wi-Fi and Bluetooth signals be used to track you?

Yes, phones constantly ping for networks, which adversaries can intercept. Example: Israeli forces have used Wi-Fi sniffers to track journalists and activists in Gaza.

What is an IMSI catcher and how does it work?

A fake cell tower that intercepts calls and messages, identifying device locations. Example: Used in Belarus to track opposition journalists.

How do night-vision devices detect smartphones?

Many night-vision optics detect IR emissions from smartphones. Example: In Afghanistan, U.S. forces used IR scanners to track Taliban movements at night.

What are the best burner phones for journalists?

Phones like the Nokia 105 or Alcatel 1066D are ideal due to their lack of smart features. Example: War correspondents in Syria used basic burner phones to avoid tracking.

How can I remove metadata from my smartphone photos?

Use apps like ExifTool or built-in settings to strip metadata. Example: Activists in Hong Kong used metadata scrubbing tools to prevent police from tracking protest locations.

By understanding these risks and taking preventative measures, photojournalists can better protect themselves and their sources while documenting critical stories. Awareness is the first step in staying safe in the digital age.

 

Related Posts