Anonymity in the Modern Metropolis
The modern metropolis is a vast and complex organism, permeated by streams of information. While information makes the city more efficient, it also creates potential privacy issues for its residents—many of whom are unaware of the extent of surveillance. This article explores what data is collected, how it’s gathered, and how you can protect yourself.
Why Worry About Privacy and Anonymity?
Many people say, “I have nothing to hide,” or “I have nothing to fear.” But there are three main reasons to care about your privacy:
- Information Control
Whoever controls information, controls the world. Governments or private data operators gain leverage over individuals, which can be used at any time. This is especially relevant if you are a political or social activist, or if your business is of interest to someone. - Human Factor
No matter how much a data operator assures you of security, people work with this data—and sometimes they engage in illegal side jobs, selling data on the black market. Anyone, from scammers to disgruntled neighbors, can buy information about you. - Identification Errors
If a facial recognition system mistakenly identifies you as a wanted person, you could face trouble—at the very least, you might be detained. While false positives are rare, they do happen.
This article covers only mass surveillance methods, not targeted surveillance. Even if you follow all recommendations, you may still be of interest to someone.
Chapter 1: Facial Recognition Systems
Moscow currently operates one of the world’s largest facial recognition systems, based on nearly 200,000 cameras connected to a unified network. Cameras are installed on streets, in public places, building entrances, subway stations, and even turnstiles. Many of these cameras use facial recognition technology developed by Russian companies like NtechLab (known for the now-closed FindFace project) and VisionLabs.
The system likely uses databases such as photos uploaded to social networks (like VKontakte) and the “Russian Passport” system, which contains scanned passport photos—even from the 1990s. It’s unclear if the facial recognition system is directly connected to the passport database, but it’s technically possible.
The system is known to operate on:
- Turnstile cameras in the subway (installed since 2019, now at all stations), which notify police if a wanted person is detected.
- Building entrance cameras (similar to video intercoms, often with infrared for night vision), also found at some public facilities like schools and clinics.
- Cameras inside some subway cars, near doors.
- Street cameras, especially in areas of public gatherings or protests, and new cameras at subway stations and crossings.
- Mobile surveillance units at mass events (cameras mounted on police vehicles).
The cameras only transmit video; facial recognition happens centrally on servers in a data center, with storage capacity of 28 petabytes (as of 2019). The system not only recognizes faces but also logs the time and place of each appearance, effectively tracking all movements. Data is stored for at least 30 days and is reportedly sold on the dark web.
While the system helps catch wanted criminals, it is also used to track activists and political figures, and to identify participants in unauthorized protests. During the 2020 pandemic, it was used to monitor quarantine compliance, with fines issued even for taking out the trash if caught on camera.
How to Protect Yourself
- Sign petitions against facial recognition and support projects like BanCam, which advocates for banning the technology.
- Wear a mask (and ideally a cap) when entering the subway or buildings with cameras.
- Bend your head when passing through turnstiles with cameras; the greater the angle, the lower the recognition accuracy. If your face is covered and your eyes are under a cap, recognition becomes nearly impossible.
Chapter 2: Mobile Communications
Mobile phones have made communication easier but are a gift to law enforcement. Not only can your movements be tracked, but it’s also possible to identify everyone who was near a specific cell tower at a given time. Location accuracy depends on the density of cell towers—ranging from several kilometers in rural areas to a few hundred meters in city centers. More precise methods exist but are used only in targeted cases.
Mobile operators log your movements (CellID and time) for at least six months. In Russia, a law may soon allow access to this data without a court order, making it easier and cheaper to obtain.
How to Protect Yourself
- Ideally, don’t use a mobile phone—but that’s unrealistic for most people. Instead, consider these compromises:
- Don’t register your main SIM card in your name. Use a “white” SIM (registered to you) for banking and government services, and a “gray” SIM for calls and online purchases.
- Change your call SIM card regularly. Remember, your phone’s IMEI (unique modem number) is also logged. If you use a new SIM in a phone slot previously used by your “white” SIM, anonymity is compromised.
- Keep your “white” SIM turned off unless needed, and don’t use both SIMs at the same time in different locations.
- Don’t make calls or send SMS through the mobile network; use encrypted messengers instead. Calls and SMS are unencrypted and stored for six months by law.
- Turn off your phone in advance if you want to visit a place anonymously, so the last cell tower logged is far from your destination.
- Be cautious with apps like GetContact, which can reveal your real name and other data if someone in your contacts uses the app and their address book is uploaded.
Chapter 3: Payment Systems
Data Security
All transactions (bank cards or e-wallets) are permanently logged and accessible in your account. Banks and payment systems can process and share this data with third parties, as stated in most user agreements.
Money Security
Your card or e-wallet can be blocked at any time if suspicious activity is detected. With banks, you’ll likely regain access after a few days, but with payment systems, you could lose your money permanently. If you repost memes on social media, you risk being added to the Rosfinmonitoring list of extremists and terrorists—even without a court decision. Once on the list, all your accounts are blocked (you can only withdraw a small amount monthly).
How to Protect Yourself
- Use cash whenever possible, even if cashless payments seem more convenient.
- Keep a cash reserve in a safe place in case your card is blocked or lost.
Chapter 4: Transportation
It’s very difficult to move anonymously, especially over long distances. International travel requires border control, but even intercity travel is tracked.
Cars
Every vehicle has a unique license plate, easily linked to the owner. License plates are standardized for automatic recognition by road cameras, which are installed at all city exits. These cameras are used not only for speed control but also to collect movement statistics on all vehicles, not just those wanted by police. One such system is called “Pautina.”
Planes, Trains, and Intercity Buses
You can’t buy tickets for these without providing your passport details, which are entered into a special system called “Rozysk-Magistral” at the booking stage. The retention period for this data is unknown.
Local Transport: Subway, Commuter Trains, and Buses
Paying cash for single rides is now more expensive, so most people use transport cards. When you pass through a turnstile, your card number and time are sent to a server, so your movements are logged. These records can now be matched with photos from turnstile cameras. If you use a social card (e.g., for Moscow residents), your passport data and photo are already with the transit authority.
During the 2020 pandemic, Moscow introduced “electronic passes” that linked transport cards to the pass, which again included passport data. If you linked your card, consider returning it and getting a new one. Don’t link your transport card to your phone number, top up only with cash, and change cards periodically.
Chapter 5: Other Surveillance Methods
Wi-Fi and Bluetooth Tracking
Moscow’s public transport Wi-Fi requires you to link your phone number to your device. The network operator actively collaborates with city authorities and advertisers, collecting data on user activity, services used, and geolocation. The city also plans to use special hardware-software complexes to collect MAC addresses of devices in range, though modern Android and iOS devices randomize MAC addresses by default. Private companies also collect geolocation data via Wi-Fi.
How to Protect Yourself
- Avoid using city Wi-Fi networks—mobile internet is available at all subway stations and even in some tunnels.
Postscript
There’s always a balance between privacy and convenience. You can’t have both in full; you’ll have to sacrifice one for the other. It’s important to find the right balance for yourself.
While this article focuses on Moscow, the information is relevant to other cities as well. All information here is from open sources, with links provided in the text.
If you know something not covered here, message me on Telegram or leave a comment, and I’ll try to update the article.
Protect your privacy!