In a hostile environment, a camera is both weapon and weakness. It can capture truth. It can also record you into a database you didn’t agree to join.
Surveillance isn’t just what’s done to us. It’s what we accidentally do to ourselves.
If you’re filming the system, assume the system is filming you too.
The Exposure You Don’t See
You raise your phone to film an incident. You just exposed:
- Your face in the selfie cam reflection
- Your GPS location embedded in the metadata
- Your voice on the mic
- Your IP address from auto upload
- Your contacts when the app grabs permissions
- Your fingerprint if you unlock mid-recording
Every frame isn’t just what’s in front of the lens. It’s what the lens reveals about you.
And unless you scrub hard, those revelations follow you.
I’ve filmed in public before thinking I was anonymous. But I forgot my grip, my identifing marks, even the cadence of my voice all could be matched to old posts. It’s not about what you film. It’s about how much of you gets captured doing it.
Core Principle: Record Without Revealing
This is the baseline. You’re there to document the event, not become part of the evidence. Every setup, every tactic should serve one purpose:
Capture clean footage without linking it to your identity.
Let’s break down how.
Device Strategy: Clean or Shielded
Option 1: The Burner Cam
- Cheap prepaid phone or used GoPro style camera
- No SIM. No accounts. No Wi-Fi
- No syncing apps installed
- No biometrics enabled
Before deployment:
- Turn off all radios (Airplane + Bluetooth + NFC)
- Remove EXIF data after capture
- Transfer via cable, never cloud
Used gear from pawn shops or electronics recyclers work well here. Keep it truly isolated, no crossover with personal devices or accounts.
Option 2: Shielded Primary
If you must use your regular phone:
- Use a dedicated camera app that disables geotags
- Block app permissions aggressively
- Rename files before sharing
- Use an app like ScrambledExif or ObscuraCam to strip metadata
- Upload via VPN or Tor only after you’re in a safe zone
You’re dancing on a tripwire here. It can work but one slip, one sync, one auto login and it links back.
Tactics for Staying Off Camera
- Avoid reflective surfaces. Windows, mirrors, metal your reflection will betray you.
- Don’t narrate unless needed. Your voice is a biometric signature.
- Gloves or grip wraps. Hide distinctive hand features or tattoos.
- Shoot from low angles. Keeps your face out of the frame if accidentally mirrored.
- Use mounts or remote triggers. Stand farther from the camera to avoid being captured.
Remember: even your shadow in the background can be used to estimate height, gait, or gear.
Situational Awareness While Recording
Filming can lock your focus. That’s when tails tighten and cops strike. You need to split your brain:
- One part captures.
- One part scans for threats.
Keep your back to a wall if possible. Avoid tunnel vision. Watch for:
- People observing you, not the event
- Anyone trying to flank your blind spots
- Disruptive actors baiting reactions
Assign a buddy if possible, someone to spot while you film. Rotate roles if needed. No one should stay camera operator the whole time.
Handling the Data
This is where most exposure happens, after you’ve filmed.
Before Storage
- Strip metadata immediately
- Rename the file, avoid device names or timestamps that tie to your identity
- Store on encrypted device or encrypted microSD
- If sensitive, split file across multiple devices or fragments
Before Sharing
- Never upload on site. Always wait until you’re safe.
- Use VPN or Tor. Always.
- Upload via anonymized accounts or intermediaries
- Host on platforms that don’t force real identity or link accounts
- Consider alternative methods: Wormhole, OnionShare, peer to peer drops
I’ve seen people record incredible footage, only to ruin it by uploading straight from their personal YouTube. The system didn’t need a warrant. They handed over their identity with a hashtag.
Facial Recognition Evasion in Captured Scenes
You might be filming others at risk. Your footage can expose them too.
Respect that.
- Cover the innocent faces
- Crop footage to exclude bystanders
- Mask audio if names or locations are mentioned
- Consider editing out timestamps, street signs, or bus numbers
You’re not just protecting yourself. You’re protecting everyone in the frame.
Live Streaming? Rethink It.
Live streaming is risk on steroids.
- Your location is exposed instantly
- Your IP can be traced
- You have no time to edit or scrub
- People watching can alert adversaries in real time
If you must stream:
- Use a clean device on a VPN or separate network
- Obscure the background
- Keep commentary minimal
- Cut the feed the moment danger escalates
But honestly? Pre-record, scrub, and release later. Truth lands better clean than fast.
Checklist: Secure Recording Flow
Before the Event
- Prep a burner or hardened device
- Disable radios, location, biometrics
- Preload camera tools and metadata scrubbing apps
- Plan shot angles and exit strategy
During Recording
- Stay situationally aware
- Don’t narrate
- Avoid reflective surfaces
- Use gloves or wraps
- Rotate roles if working in a team
After Recording
- Strip metadata
- Rename files
- Store encrypted
- Delay uploads
- Use anonymized methods for sharing
- Protect others caught on camera
Imperfect? Always.
I’ve filmed things I later regretted. Not because of what I caught but because of how I caught it. Forgot to strip audio. Uploaded while adrenaline was still high. Exposed myself when I should’ve stayed silent.
You won’t get it perfect. You’ll make mistakes. The point is to build a system that reduces risk with every repetition.
Final Word
Your camera can capture evidence. Or it can become evidence against you.
Filming is power. But power cuts both ways. If you’re going to document truth, do it without writing your name in the metadata.
Capture clean. Move smart. Erase your trail.
-GHOST
Written by GHOST, creator of the Untraceable Digital Dissident project.
This is part of the Untraceable Digital Dissident series — tactical privacy for creators and rebels.
Explore more privacy tactics at untraceabledigitaldissident.com.