In practical terms, smartphones generate at least three kinds of digital exposure.
The first is identification risk,
including through facial recognition technology.
When you post footage, you may be sharing identifiable faces, tattoos, voices, license plates, school logos or even a distinctive jacket.
That can enable law enforcement to identify people in your recordings through investigative tools,
and online crowds to identify people and dox or harass them, or both.
That risk grows when agencies deploy facial recognition in the field.
For example, ICE is using a facial recognition app called #Mobile #Fortify.
Facial recognition accuracy also isn’t neutral.
National Institute of Standards and Technology testing has documented that the technology does not perform equally across different demographic groups,
meaning the risk of misidentification is not evenly distributed across groups.
For example, studies have shown lower recognition accuracy for people with darker skin color.
Second is the risk of revealing your location.
Footage isn’t just images. Photos and video files often contain #metadata such as timestamps and locations,
and platforms also maintain additional logs.
Even if you never post, your phone still emits a steady stream of location signals.
This matters because agencies can obtain location through multiple channels, often with different levels of oversight.
Agencies can request location or other data from companies through warrants or court orders,
including geofence warrants that sweep up data about every device in a place during a set time window.
Agencies can also buy location data from brokers.
The Federal Trade Commission has penalized firms for unlawfully selling sensitive location information.
There are more pathways for tracking than most people realize,
and not all are constrained by the courtroom rules people picture when they think “warrant.”
The third type of potential exposure is the risk of having your phone seized.
If police seize your phone, temporarily or for evidence,
your exposure isn’t just the video you shot.
It can include your contacts and message history,
your photo roll,
location history
and cloud accounts synced to the device.
Civil liberties groups that publish protest safety guidance consistently recommend
disabling the face and fingerprint unlocking features
and using a strong passcode.
Law enforcement officials can compel you to use biometrics more easily in some contexts than reveal memorized secrets.