<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Snarfblat</id>
	<title>Consumer Rights Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://consumerrights.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Snarfblat"/>
	<link rel="alternate" type="text/html" href="https://consumerrights.wiki/w/Special:Contributions/Snarfblat"/>
	<updated>2026-04-29T06:10:12Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.44.0</generator>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Imgur&amp;diff=37828</id>
		<title>Imgur</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Imgur&amp;diff=37828"/>
		<updated>2026-02-20T15:58:01Z</updated>

		<summary type="html">&lt;p&gt;Snarfblat: /* Mass layoffs damaging functionality */ Added citation for claim that Imgur had layoffs after being acquired by MediaLab.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{CompanyCargo&lt;br /&gt;
| Description   = Imgur is a media company and image sharing platform - originally founded by Alan Schaaf, it is now bought and owned by MediaLab AI, Inc.&lt;br /&gt;
| Founded       = 2009&lt;br /&gt;
| Industry      = Media Hosting&lt;br /&gt;
| Logo          = Imgur.svg&lt;br /&gt;
| ParentCompany = MediaLab AI, Inc.&lt;br /&gt;
| Type          = Private&lt;br /&gt;
| Website       = https://imgur.com/&lt;br /&gt;
}}&lt;br /&gt;
&#039;&#039;&#039;{{Wplink|Imgur}}&#039;&#039;&#039; is both a media company and image sharing platform turned social media platform founded by Alan Schaaf in 2009. The platform was initially intended to act as a format for users on [[Reddit]] to share images. It has been owned by MediaLab AI, Inc.&amp;lt;!--If this company gets an article, make sure to make a couple redirect pages to MediaLab with the following names:&lt;br /&gt;
MediaLab&lt;br /&gt;
MediaLab AI--&amp;gt; since its acquisition in 2021.&amp;lt;ref&amp;gt;{{Cite web |date=2021 |title=Celebrating Imgur&#039;s Next Chapter |url=https://imgur.com/gallery/celebrating-imgurs-next-chapter-We6yCM2 |url-status=live |archive-url=https://archive.is/rPEUq |archive-date=2025-07-12 |access-date=2025-07-12 |website=imgur}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
===User Freedom===&lt;br /&gt;
Users can upload content to the platform, however it cannot be used as a content delivery network (CDN) as per their TOS,&amp;lt;ref name=&amp;quot;:02&amp;quot;&amp;gt;{{Cite web |date=November 28, 2022 |title=Imgur TOS |url=https://imgur.com/tos |url-status=live |archive-url=http://web.archive.org/web/20230113071334/https://imgur.com/tos |archive-date=Jan 13, 2023 |access-date=March 3, 2025 |website=Imgur.com}}&amp;lt;/ref&amp;gt; despite its initial purpose being as such.&lt;br /&gt;
===User Privacy===&lt;br /&gt;
Automatically collects device information, which includes device ID (for mobile devices), operating system, IP address. Uses technology such as tracking cookies to improve the &amp;quot;server&#039;s interaction with your device&amp;quot; alongside third-party advertisements.&amp;lt;ref&amp;gt;{{Cite web |title=Privacy Policy |url=https://imgur.com/privacy |access-date=13 Aug 2025 |website=Imgur}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
===Business Model===&lt;br /&gt;
Imgur gains revenue via advertisements seen by consumers. Payment is provided by the companies which pay for advertising space on Imgur’s website.&lt;br /&gt;
===Market Control===&lt;br /&gt;
There is limited competition in the web-empowered photo-sharing field, which allows Imgur to dominate.&lt;br /&gt;
&lt;br /&gt;
==Incidents==&lt;br /&gt;
This is a list of all consumer protection incidents this company is involved in. Any incidents not mentioned here can be found in the [[:Category:{{FULLPAGENAME}}|{{PAGENAME}} category]].&lt;br /&gt;
&lt;br /&gt;
===Binding arbitration (Nov 28, 2021)===&lt;br /&gt;
Shortly after [[MediaLab]] acquired Imgur in 2021 they updated their TOS&amp;lt;ref name=&amp;quot;:02&amp;quot; /&amp;gt; to include a [[Forced arbitration|binding arbitration]] notice:&amp;lt;blockquote&amp;gt;These Terms contain a binding arbitration provision and class action waiver terms. Unless you opt out or there is a suit in small claims court, you and we agree to submit disputes to a neutral arbitrator and not to sue in court in front of a judge or jury.&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Advertising overload&amp;lt;!--Cool source I found, not exactly relevant, but it was mentioned in one of the sources I used here:  https://web.archive.org/web/20180615183306/https://downloads.pagefair.com/wp-content/uploads/2016/05/Adblocking-Goes-Mainstream.pdf--&amp;gt;===&lt;br /&gt;
&amp;lt;blockquote&amp;gt;Further Reading: [[Advertising overload]]&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
[[File:Ad_Overload_Imgur.png|thumb|An example of how frequent advertisements are for users on Imgur. Via: https://imgur.com/gallery/too-many-ads-9vzuP7x]]&lt;br /&gt;
While initially introduced as a method for keeping the platform up amid increasing server costs since the 2010s,&amp;lt;ref&amp;gt;{{Cite news |last=Imgur staff |date=Apr 4, 2016 |title=About Ads on Imgur |url=https://blog.imgur.com/2016/04/04/ads-and-the-apps/ |url-status=dead |archive-url=https://web.archive.org/web/20160912072231/https://blog.imgur.com/2016/04/04/ads-and-the-apps/ |archive-date=Sep 12, 2016 |access-date=Mar 5, 2025 |work=Imgur blog}}&amp;lt;/ref&amp;gt; for nearly a decade, users have been complaining about a large amount of advertisements on both the website and especially the mobile app.&amp;lt;ref&amp;gt;https://imgur.com/gallery/so-many-ads-J39ioLs&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;:1&amp;quot;&amp;gt;https://imgur.com/gallery/i-keep-getting-pop-ups-whole-browsing-on-phone-9kBpBWP&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;https://imgur.com/gallery/no-wonder-we-have-so-many-trouble-with-ads-on-imgur-NgB8lVO&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Their negligence to also moderate advertisements has also led to ads of dubious quality to also be seen on both the website and mobile app.&amp;lt;ref&amp;gt;{{Cite news |last=arandompenguin |date=Jul 3, 2016 |title=Imgur and Ads: A Controversy |url=https://imgur.com/gallery/imgur-ads-controversy-8Mk43 |url-status=live |archive-url=https://web.archive.org/web/20250305205210/https://imgur.com/gallery/imgur-ads-controversy-8Mk43 |archive-date=Mar 5, 2025 |access-date=Mar 4, 2025 |work=Imgur}}&amp;lt;/ref&amp;gt; Additionally malicious advertisers historically took advantage of unmitigated JavaScript vulnerabilities to cause their advertisements to immediately redirect a user&#039;s browser to their website,&amp;lt;ref name=&amp;quot;:1&amp;quot; /&amp;gt; with one user reporting being redirected to a phishing website.&amp;lt;ref&amp;gt;{{Cite web |last=BaldBandit |first= |date=Jul 2, 2016 |title=This is not acceptable. |url=https://imgur.com/gallery/this-is-not-acceptable-dMytYzc |url-status=live |archive-url=https://web.archive.org/web/20250305202630/https://imgur.com/gallery/this-is-not-acceptable-dMytYzc |archive-date=Mar 5, 2025 |access-date=Mar 5, 2025 |website=imgur}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Removal of anonymous images (2023)===&lt;br /&gt;
In April 2023, Imgur notified users they will start removing explicit pornographic images and ones uploaded anonymously on May 15.&amp;lt;ref&amp;gt;{{Cite news |last=Purdy |first=Kevin |date=Apr 20, 2023 |title=Hosting site Imgur will remove explicit and anonymous content next month |url=https://arstechnica.com/gadgets/2023/04/hosting-site-imgur-will-remove-explicit-and-anonymous-content-next-month/ |url-status=live |archive-url=https://web.archive.org/web/20230420171637/https://arstechnica.com/gadgets/2023/04/hosting-site-imgur-will-remove-explicit-and-anonymous-content-next-month/ |archive-date=Apr 20, 2023 |access-date=Mar 5, 2025 |work=Ars Technica}}&amp;lt;/ref&amp;gt; The reason stated was due to these being &amp;quot;old, unused, and inactive content&amp;quot;, though artistic nudity was not affected by these changes.&amp;lt;ref&amp;gt;{{Cite news |last=Moon |first=Mariella |date=Apr 20, 2023 |title=Imgur to ban explicit images and delete uploads not tied to an account |url=https://www.engadget.com/imgur-to-ban-explicit-images-and-delete-uploads-not-tied-to-an-account-122537118.html?guccounter=1 |url-status=live |archive-url=https://web.archive.org/web/20241225023935/https://www.engadget.com/imgur-to-ban-explicit-images-and-delete-uploads-not-tied-to-an-account-122537118.html |archive-date=Dec 25, 2024 |access-date=Mar 5, 2025 |work=engadget}}&amp;lt;/ref&amp;gt; Some users on [[Reddit]] mentioned this move as &amp;quot;a full [[Tumblr]]&amp;quot;, with others calling Imgur &amp;quot;completely dead&amp;quot; after this change is implemented.&amp;lt;ref&amp;gt;{{Cite news |last=u/RamonaLittle |date=Apr 20, 2023 |title=Imgur has announced that they will be &amp;quot;removing old, unused, and inactive content that is not tied to a user account from our platform.&amp;quot; This means that a *huge* number of images linked from reddit will become dead links. |url=https://www.reddit.com/r/TheoryOfReddit/comments/12tinfp/imgur_has_announced_that_they_will_be_removing/ |url-status=live |archive-url=https://web.archive.org/web/20230427010856/https://old.reddit.com/r/TheoryOfReddit/comments/12tinfp/imgur_has_announced_that_they_will_be_removing/ |archive-date=Apr 27, 2023 |access-date=Mar 5, 2025 |work=Reddit}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Child data usage (2025)===&lt;br /&gt;
On March 3, 2025, it was reported that Imgur, along with [[Reddit]] and [[TikTok]] were being investigated by the [[British Information Commissioner’s Office]] (ICO).&amp;lt;ref&amp;gt;{{Cite news |last=Landi |first=Martyn |date=Mar 3, 2025 |title=TikTok and others investigated over use of children’s data |url=https://www.irishexaminer.com/world/arid-41585470.html |url-status=live |archive-url=https://web.archive.org/web/20250305214845/https://www.irishexaminer.com/world/arid-41585470.html |archive-date=Mar 5, 2025 |access-date=Mar 5, 2025 |work=Irish Examiner |ref=Landi-2025-article-1}}&amp;lt;/ref&amp;gt; [[Reddit]] and Imgur allegedly tailored the experience for children aged 13-17 by estimating or verifying their age.&amp;lt;ref&amp;gt;{{Cite news |last=Landi |first=Martyn |date=Mar 3, 2025 |title=TikTok, Reddit and Imgur investigated over the use of children&#039;s data |url=https://uk.news.yahoo.com/tiktok-reddit-imgur-investigated-over-092202216.html |url-status=live |archive-url=https://web.archive.org/web/20250305215130/https://consent.yahoo.com/v2/collectConsent?sessionId=2_cc-session_f472bd30-fd21-4964-be45-27dbac0d4610 |archive-date=Mar 5, 2025 |access-date=Mar 5, 2025 |work=Machester Evening News via Yahoo |ref=Landi-2025-article-2}}&amp;lt;/ref&amp;gt;&amp;lt;!--Note: Yahoos JS breaks IA, someone will need to likely use the extension for the Wayback machine for people to archive this URL!--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Mass layoffs damaging functionality===&lt;br /&gt;
When Imgur was acquired by [[MediaLab AI, Inc.|MediaLab]], it subsequently underwent significant staff cuts, including layoffs affecting its human moderation and other operations teams.&amp;lt;ref&amp;gt;{{Cite web |title=Imgur protest covers the front page in anti-MediaLab memes |website=Engadget |date=2025-08-25 |url=https://www.engadget.com/apps/imgur-protest-covers-the-front-page-in-anti-medialab-memes-225502091.html |access-date=2026-02-20}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=Imgur&#039;s Community Is In Full Revolt Against Its Owner |website=Slashdot |date=2025-08-28 |url=https://tech.slashdot.org/story/25/08/28/1816210/imgurs-community-is-in-full-revolt-against-its-owner |access-date=2026-02-20}}&amp;lt;/ref&amp;gt; This has led to users on the platform facing features frequently breaking, and with the firing of its community management in July 2025,&amp;lt;ref&amp;gt;{{Cite web |last=Nelson |first=Travis |date=Aug 26, 2025 |title=A little story about a site called Imgur. |url=https://bsky.app/profile/sigirides.bsky.social/post/3lxcjdm7ouk2v |access-date=Aug 30, 2025 |website=BlueSky}}&amp;lt;/ref&amp;gt; the platform additionally had its transparency eliminated, eventually causing mass-revolts in late August 2025, when the notification feature on the platform was left non-functioning for 3 days.&amp;lt;ref&amp;gt;{{Cite news |last=Washenko |first=Anna |date=Aug 25, 2025 |title=Imgur protest covers the front page in anti-MediaLab memes |url=https://www.engadget.com/apps/imgur-protest-covers-the-front-page-in-anti-medialab-memes-225502091.html |access-date=Aug 26, 2025 |work=Engadget}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite news |last=Galt |first=Matthew |date=Aug 28, 2025 |title=Imgur&#039;s Community Is In Full Revolt Against Its Owner |url=https://www.404media.co/imgurs-community-is-in-full-revolt-against-its-owner/ |access-date=Aug 30, 2025 |work=404 Media}}&amp;lt;/ref&amp;gt; Instead of communicating with the community about the problem, the remaining moderation instead punished users on the platform.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt; Protest content published to platform has ranged from images of John Oliver to not safe for work content.&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
*[[MediaLab AI, Inc.]]&lt;br /&gt;
*[[Reddit]]&lt;br /&gt;
*[[Social media platform]]&amp;lt;!--If made, include &amp;quot;Social media&amp;quot; as redirect to that page--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
[[Category:{{PAGENAME}}]]&lt;/div&gt;</summary>
		<author><name>Snarfblat</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=Flock_license_plate_readers&amp;diff=37818</id>
		<title>Flock license plate readers</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=Flock_license_plate_readers&amp;diff=37818"/>
		<updated>2026-02-20T14:47:58Z</updated>

		<summary type="html">&lt;p&gt;Snarfblat: Citation/rewording of sentences about privacy advocates warning about racial profiling enabled by Flock cameras.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-- Research conducted December 2024; enhanced with additional company responses, legal developments, and regulatory actions --&amp;gt;&lt;br /&gt;
{{ProductCargo&lt;br /&gt;
|Company=Flock Safety&lt;br /&gt;
|ProductLine=Flock Safety Falcon&lt;br /&gt;
|ReleaseYear=2017&lt;br /&gt;
|InProduction=Yes&lt;br /&gt;
|ArticleType=Product&lt;br /&gt;
|Category=Cameras, Security, Surveillance&lt;br /&gt;
|Logo=Flock License plate readers (LPR).png&lt;br /&gt;
|Website=https://www.flocksafety.com/products/license-plate-readers&lt;br /&gt;
|Description=AI-powered automated license plate reader (ALPR) system that creates &amp;quot;Vehicle Fingerprints&amp;quot; by recording license plates, vehicle characteristics, and movement patterns for law enforcement use without individual consent or warrants.&lt;br /&gt;
}}&lt;br /&gt;
&#039;&#039;&#039;Flock License Plate Readers&#039;&#039;&#039; (previously known as &#039;&#039;&#039;Flock Safety Falcon&#039;&#039;&#039;&amp;lt;ref&amp;gt;{{Cite web |url=https://www.flocksafety.com/devices/falcon|title=Falcon|work=Flock Safety |access-date=6 Dec 2024 |archive-url=https://archive.ph/UjKM5 |archive-date=6 Dec 2024 |url-status=usurped}}&amp;lt;/ref&amp;gt;), are a network of AI-powered surveillance cameras that record vehicle data for law enforcement agencies. The system operates in over 5,000 communities across 49 states in the U.S.A.&amp;lt;ref&amp;gt;{{Cite web |last=Hamid |first=Sarah |last2=Alajaji |first2=Rindala |date=27 Jun 2025 |title=Flock Safety&#039;s Feature Updates Cannot Make Automated License Plate Readers Safe |url=https://www.eff.org/deeplinks/2025/06/flock-safetys-feature-updates-cannot-make-automated-license-plate-readers-safe |url-status=live |archive-url=https://web.archive.org/web/20250628052030/https://www.eff.org/deeplinks/2025/06/flock-safetys-feature-updates-cannot-make-automated-license-plate-readers-safe |archive-date=28 Jun 2025 |access-date=23 Aug 2025 |work=Electronic Frontier Foundation}}&amp;lt;/ref&amp;gt; According to the company&#039;s own marketing materials, Flock performs over 20 billion vehicle scans monthly.&amp;lt;ref&amp;gt;{{Cite web |title=Flock Safety |url=https://www.flocksafety.com/ |url-status=live |archive-url=https://archive.ph/iVsBZ |archive-date=26 Aug 2025 |access-date=23 Aug 2025 |work=Flock Safety}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Consumer impact summary==&lt;br /&gt;
====Freedom====&lt;br /&gt;
Residents and taxpayers have no mechanism to opt out of [[Flock Safety]]&#039;s surveillance network. The cameras operate 24/7 in public spaces, recording all passing vehicles regardless of consent. They are also placed on private premises like universities, hospitals, businesses, and neighborhood associations, which often share this data with law enforcement.&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |last=Brewster |first=Thomas |date=19 Jun 2024 |title=FedEx&#039;s Secretive Police Force Is Helping Cops Build An AI Car Surveillance Network |url=https://www.forbes.com/sites/thomasbrewster/2024/06/19/fedex-police-help-cops-build-an-ai-car-surveillance-network/ |url-status=live |archive-url=https://web.archive.org/web/20240619112629/https://www.forbes.com/sites/thomasbrewster/2024/06/19/fedex-police-help-cops-build-an-ai-car-surveillance-network/ |archive-date=19 Jun 2024 |access-date=25 Aug 2025 |website=Forbes}}&amp;lt;/ref&amp;gt; This data can later be integrated into predictive police platforms like {{Wplink|Palantir Technologies|Palantir}}.&amp;lt;ref&amp;gt;{{Cite book |last=Rettberg |first=Jill Walker |title=Machine Vision: How Algorithms are Changing the Way We See the World |date=11 Sep 2023 |publisher=John Wiley &amp;amp; Sons. |year=2023 |location=Google Books |pages=45-46 |language=English}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Unlike traditional security cameras that may be avoided by choosing different routes, Flock&#039;s expanding network of over 100,000 cameras makes avoidance increasingly difficult.&amp;lt;ref&amp;gt;{{Cite web |title=Eyes On Flock |url=https://eyesonflock.com/ |url-status=live |archive-url=https://web.archive.org/web/20251008230140/https://eyesonflock.com/ |archive-date=2025-10-08 |access-date=9 Dec 2025 |work=Eyes On Flock}}&amp;lt;/ref&amp;gt; The system uses AI to create &#039;&#039;&amp;quot;Vehicle [[Device fingerprint|Fingerprints]]&amp;quot;&#039;&#039; that identify vehicles by characteristics beyond license plates, including make, model, color, aftermarket parts, window stickers, and roof racks.&amp;lt;ref&amp;gt;{{Cite web |last=Stanley |first=Jay |date=23 Jul 2025 |title=Surveillance Company Flock Now Using AI to Report Us to Police if it Thinks Our Movement Patterns Are &amp;quot;Suspicious&amp;quot; |url=https://www.aclu.org/news/national-security/surveillance-company-flock-now-using-ai-to-report-us-to-police-if-it-thinks-our-movement-patterns-are-suspicious |url-status=live |archive-url=https://web.archive.org/web/20250814053755/https://www.aclu.org/news/national-security/surveillance-company-flock-now-using-ai-to-report-us-to-police-if-it-thinks-our-movement-patterns-are-suspicious |archive-date=14 Aug 2025 |access-date=23 Aug 2025 |work=American Civil Liberties Union}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Privacy====&lt;br /&gt;
While Flock Safety claims their system doesn&#039;t violate Fourth Amendment rights because &#039;&#039;&amp;quot;license plates are not personal information,&amp;quot;&#039;&#039;&amp;lt;ref name=&amp;quot;Flock-PE&amp;quot;&amp;gt;{{Cite web |url=https://www.flocksafety.com/privacy-ethics |title=Privacy &amp;amp; Ethics |work=Flock Safety |access-date=23 Aug 2025 |archive-url=https://archive.ph/OP55p |archive-date=23 Aug 2025 |url-status=live}}&amp;lt;/ref&amp;gt; federal courts have challenged this interpretation. In February 2024, a federal judge ruled that a lawsuit challenging Norfolk, Virginia&#039;s use of 172 Flock cameras could proceed, finding that plaintiffs had plausibly alleged the system creates a &#039;&#039;&amp;quot;detailed chronicle of a person&#039;s physical presence compiled every day.&amp;quot;&#039;&#039;&amp;lt;ref name=&amp;quot;norfolk&amp;quot;&amp;gt;{{Cite web |last=King |first=Dan |date=6 Feb 2024 |title=Judge Rules Lawsuit Challenging Norfolk&#039;s Use of Flock Cameras Can Proceed |url=https://ij.org/press-release/judge-rules-lawsuit-challenging-norfolks-use-of-flock-cameras-can-proceed/ |url-status=live |archive-url=https://web.archive.org/web/20250717001536/https://ij.org/press-release/judge-rules-lawsuit-challenging-norfolks-use-of-flock-cameras-can-proceed/ |archive-date=17 Jul 2025 |access-date=23 Aug 2025 |work=Institute for Justice}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Data collected includes location history that can reveal sensitive information about medical visits, religious attendance, political activities, and personal associations. While Flock states data is deleted after 30 days, contracts grant them &#039;&#039;&amp;quot;perpetual, worldwide, royalty-free license&amp;quot;&#039;&#039; to use anonymized data indefinitely.&amp;lt;ref name=&amp;quot;:1&amp;quot;&amp;gt;{{Cite web |title=Terms and Conditions |url=https://www.flocksafety.com/terms-and-conditions |url-status=live |archive-url=https://archive.ph/DSqUM |archive-date=26 Oct 2025 |access-date=23 Aug 2025 |work=Flock Safety}}&amp;lt;/ref&amp;gt; The system shares data across a network of over 4,800 law enforcement agencies nationally.&amp;lt;ref&amp;gt;{{Cite web |last=Koebler |first=Jason |date=2024 |title=Lawsuit Argues Warrantless Use of Flock Surveillance Cameras Is Unconstitutional |url=https://www.404media.co/lawsuit-argues-warrantless-use-of-flock-surveillance-cameras-is-unconstitutional/ |url-status=live |archive-url=https://web.archive.org/web/20250826013458/https://www.404media.co/lawsuit-argues-warrantless-use-of-flock-surveillance-cameras-is-unconstitutional/ |archive-date=26 Aug 2025 |access-date=23 Aug 2025 |work=404 Media}}&amp;lt;/ref&amp;gt;  &lt;br /&gt;
&lt;br /&gt;
=====&amp;quot;Anonymized Data&amp;quot;=====&lt;br /&gt;
While Flock&#039;s Terms and Conditions define &amp;quot;Anonymized Data&amp;quot; as customer data that is &#039;&#039;&amp;quot;permanently stripped of identifying details and any potential personally identifiable information&amp;quot;&#039;&#039; and is rendered so that a person or entity &#039;&#039;&amp;quot;can no longer be identified directly or indirectly,&amp;quot;&#039;&#039; this definition includes information such as vehicle make, model, color, location patterns, and other non–license-plate attributes.&amp;lt;ref name=&amp;quot;:1&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Privacy researchers caution that mobility datasets labeled as &amp;quot;anonymized&amp;quot; can still be re-identified. A 2013 MIT study found that just four spatio-temporal points uniquely identified 95% of individuals in an anonymized location dataset.&amp;lt;ref&amp;gt;{{Cite journal |last=de Montjoye |first=Y.-A. |last2=Hidalgo |first2=C. A. |last3=Verleysen |first3=M. |last4=Blondel |first4=V. D. |year=2013 |title=Unique in the Crowd: The privacy bounds of human mobility |url=https://www.nature.com/articles/srep01376 |journal=Scientific Reports |volume=3 |pages=1376 |doi=10.1038/srep01376 |access-date=23 Aug 2025}}&amp;lt;/ref&amp;gt; Multiple peer-reviewed studies from 2018-2024 demonstrate that &amp;quot;anonymized&amp;quot; vehicle location data can be re-identified with high accuracy. A 2022 study showed researchers could re-identify drivers from raw vehicle network data with 97% accuracy by exploiting inter-dependencies in sensor measurements.&amp;lt;ref&amp;gt;{{Cite web |url=https://www.sciencedirect.com/science/article/abs/pii/S0167404822002139 |title=Privacy-preserving vehicle trajectory matching |website=ScienceDirect |date=2022 |access-date=5 Oct 2025}}&amp;lt;/ref&amp;gt; Research published in the Journal of Computer Science and Technology (2022) found that even three to four location points can uniquely identify individuals.&amp;lt;ref&amp;gt;{{Cite journal |last=Sun |first=She |last2=Ma |first2=Shuai |last3=Song |first3=Jing-He |last4=Yue |first4=Wen-Hai |last5=Lin |first5=Xue-Lian |last6=Ma |first6=Tiejun |date=2022 |title=Experiments and Analyses of Anonymization Mechanisms for Trajectory Data Publishing |url=https://link.springer.com/article/10.1007/s11390-022-2409-x |journal=Journal of Computer Science and Technology |doi=10.1007/s11390-022-2409-x |access-date=5 Oct 2025}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Business model====&lt;br /&gt;
Flock operates on a subscription model charging municipalities and law enforcement agencies $2,500 USD per camera annually plus installation costs.&amp;lt;ref&amp;gt;{{Cite web|url=https://campbellca.gov/FAQ.aspx?QID=279 |title=How much does a Flock Safety camera cost? |work=City of Campbell |access-date=23 Aug 2025}}&amp;lt;/ref&amp;gt; Private businesses including Home Depot, Lowe&#039;s, and FedEx also deploy cameras, sharing data with law enforcement.&amp;lt;ref&amp;gt;{{Cite web |url=https://www.404media.co/home-depot-and-lowes-share-data-from-hundreds-of-ai-cameras-with-cops/ |title=Home Depot and Lowe&#039;s Share Data From Hundreds of AI Cameras With Cops |first=Jason |last=Koebler |date=6 Aug 2025 |work=404 Media |access-date=23 Aug 2025 |archive-url=https://web.archive.org/web/20250823135847/https://www.404media.co/home-depot-and-lowes-share-data-from-hundreds-of-ai-cameras-with-cops/ |archive-date=23 Aug 2025 |url-status=live}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt; Contracts include automatic renewal clauses and limit municipal oversight capabilities, with cities unable to audit system operations or control how other agencies use shared data.&amp;lt;ref&amp;gt;{{Cite web |url=https://www.aclu.org/wp-content/uploads/publications/flock_1.pdf |title=How to Pump the Brakes on Your Police Department&#039;s Use of Flock&#039;s Mass Surveillance License Plate Readers |work=American Civil Liberties Union |date=2024 |access-date=23 Aug 2025}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====Market control====&lt;br /&gt;
Flock Safety has rapidly expanded to become a dominant force in automated license plate recognition, operating in 49 states with over 40,000 cameras deployed. The company&#039;s network effect creates pressure for additional jurisdictions to join, as law enforcement effectiveness depends on network coverage. Several states have begun restricting access following privacy violations, with California, Illinois, and New York limiting data sharing after immigration and abortion-related tracking incidents.&amp;lt;ref&amp;gt;{{Cite web |url=https://www.michaelrcronin.com/post/flock-blocks-ice-from-license-plate-reader-access-in-several-states |title=&#039;Flock&#039; Blocks ICE from License Plate Reader Access in Several States |work=Yes You Can Go |date=2025 |access-date=23 Aug 2025}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Premise of a &amp;quot;license plate camera&amp;quot;===&lt;br /&gt;
While marketed as &amp;quot;license plate readers,&amp;quot;&#039; Flock cameras use what the company calls &amp;quot;Vehicle Fingerprint&amp;quot; technology which tracks vehicles using characteristics beyond just license plates. The system catalogs vehicles based on numerous distinguishing features including make, model, color, bumper stickers, dents, damage patterns, roof racks, aftermarket modifications such as wheels or spoilers, window stickers, and even mismatching paint colors.&amp;lt;ref name=&amp;quot;:2&amp;quot;&amp;gt;{{Cite web |date= |title=LPR Cameras |url=https://www.flocksafety.com/products/license-plate-readers |url-status=usurped |access-date=26 Oct 2025 |work=Flock Safety}}&amp;lt;/ref&amp;gt;. According to Flock&#039;s own marketing materials, the system can identify vehicles even when license plates cannot be captured, advertised as turning &amp;quot;images into actionable evidence — no plate required.&amp;quot;&amp;lt;ref&amp;gt;{{Cite web |title=License Plate Readers |url=https://www.flocksafety.com/products/license-plate-readers |url-status=live |archive-url=https://archive.ph/D9JGD |archive-date=23 Aug 2025 |access-date=23 Aug 2025 |work=Flock Safety}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Flock claims this capability is &#039;&#039;&amp;quot;unique among ALPR systems&amp;quot;&#039;&#039; and allows law enforcement to search for vehicles based on these characteristics even without a visible license plate.&lt;br /&gt;
&lt;br /&gt;
This technology changes the nature of the surveillance from license plate reading to comprehensive vehicle tracking. A person could still be tracked by the unique combination of their vehicle&#039;s physical characteristics. The Electronic Frontier Foundation warns that these &#039;&#039;&amp;quot;vehicle fingerprints&amp;quot;&#039;&#039; could flag vehicles based on political bumper stickers, revealing &#039;&#039;&amp;quot;information on the political or social views of the driver,&amp;quot;&#039;&#039; or economic indicators like rust or damage, potentially &amp;quot;endangering anyone who might not feel the need (or have the income required) to keep their car in perfect shape.&amp;quot;&amp;lt;ref&amp;gt;{{Cite web |date=2020-09-14 |title=Things to Know Before Your Neighborhood Installs an Automated License Plate Reader |url=https://www.eff.org/deeplinks/2020/09/flock-license-plate-reader-homeowners-association-safe-problems |access-date=2025-08-23 |work=Electronic Frontier Foundation}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Privacy advocates note that this expanded tracking capability makes the term &#039;&#039;&amp;quot;license plate reader&amp;quot;&#039;&#039; misleading, as Flock systems create detailed vehicle profiles that persist even without readable plates. It turns any distinguishing feature of a vehicle into a tracking identifier.&amp;lt;ref&amp;gt;{{Cite web |title=Stop Flock |url=https://www.stopflock.com/ |access-date=2025-08-23 |work=Stop Flock}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Patent for person identification by race and physical characteristics==&lt;br /&gt;
A U.S. Patent granted to Flock Group Inc. in August 2022 reveals the company has developed and patented technology to identify and classify people based on race, gender, and other physical characteristics.&amp;lt;ref name=&amp;quot;patent11416545&amp;quot;&amp;gt;{{Cite web |url=https://patentimages.storage.googleapis.com/77/9a/03/7b3b26499077d4/US11416545.pdf |title=System and Method for Object Based Query of Video Content Captured by a Dynamic Surveillance Network |website=United States Patent and Trademark Office |date=16 Aug 2022 |access-date=21 Jan 2025 |format=PDF |first1=Garrett |last1=Langley |first2=Matt |last2=Feury &amp;lt;!-- |patent=US11416545B1 --&amp;gt;}}&amp;lt;/ref&amp;gt; Patent US 11,416,545 B1 describes a system that goes beyond vehicle identification to analyze human subjects captured in surveillance footage.&lt;br /&gt;
&lt;br /&gt;
According to the patent documentation, when the system identifies a human being in captured footage, it uses neural network modules specifically configured to classify people by &amp;quot;male, female, race, etc.&amp;quot; The patent further describes using additional neural networks to identify clothing types, estimate height and weight, and other physical characteristics of individuals.&amp;lt;ref name=&amp;quot;patent11416545&amp;quot; /&amp;gt; The system can then store this classification data in searchable databases, allowing law enforcement to query for people based on these physical attributes.&lt;br /&gt;
&lt;br /&gt;
The patent shows that Flock&#039;s technology is designed to create comprehensive profiles that can track individuals across multiple camera locations by matching physical characteristics. While Flock publicly markets its products as &#039;&#039;&amp;quot;license plate readers&amp;quot;&#039;&#039; focused on vehicles, this patent demonstrates the company has developed capabilities for detailed human surveillance and classification by protected characteristics including race and gender.&amp;lt;ref name=&amp;quot;patent11416545&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Privacy and civil-liberties advocates have warned that biometric/appearance-based identification and classification—especially along race and gender lines—can enable discriminatory policing and amplify harms from demographic bias and misidentification.&amp;lt;ref&amp;gt;{{Cite web |title=How is Face Recognition Surveillance Technology Racist? |website=American Civil Liberties Union |date=2020-06-16 |url=https://www.aclu.org/news/privacy-technology/how-is-face-recognition-surveillance-technology-racist |access-date=2026-02-20}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=NIST Study Evaluates Effects of Race, Age, Sex on Face Recognition Software |website=National Institute of Standards and Technology |date=2019-12-19 |url=https://www.nist.gov/news-events/news/2019/12/nist-study-evaluates-effects-race-age-sex-face-recognition-software |access-date=2026-02-20}}&amp;lt;/ref&amp;gt; In that context, the Flock Group patent’s explicit discussion of classifying people by attributes including “race” and “male/female” suggests capabilities that extend beyond vehicle identification.&amp;lt;ref&amp;gt;{{Cite web |title=US11416545B1 - System and method for object based query of video content captured by a dynamic surveillance network |website=Google Patents |date=2022-08-16 |url=https://patents.google.com/patent/US11416545B1 |access-date=2026-02-20}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Legal challenges==&lt;br /&gt;
&lt;br /&gt;
===Washington state judge declares Flock footage as public records &#039;&#039;(6 Nov 2025)&#039;&#039;===&lt;br /&gt;
An Oregon resident filed public records requests at various police departments in the state of Washington regarding information collected from Flock cameras. The cities of Stanwood and Sedro-Woolley filed a motion to reject the resident&#039;s request, with their attorney stating that publicizing Flock footage may be a violation of privacy that could lead to stalking.&lt;br /&gt;
&lt;br /&gt;
Some exemptions are given to deny public records request, particularly due to investigations. However, the judge dismissed the motion, declaring that the camera footage was &amp;quot;so broad and indiscriminate&amp;quot; with no distinction between criminal activity and casual civilian activity that the data had to be released to the public.&amp;lt;ref&amp;gt;{{Cite web |last=Ingalls |first=Chris |date=6 Nov 2025 |title=Judge orders police to release surveillance camera data, raising privacy questions |url=https://www.king5.com/article/news/investigations/investigators/judge-orders-washington-police-release-surveillance-camera-data-privacy-questions/281-c2037d52-6afb-4bf7-95ad-0eceaf477864 |access-date=8 Nov 2025 |website=KING5}}&amp;lt;/ref&amp;gt;&amp;lt;ref name=&amp;quot;:5&amp;quot;&amp;gt;{{Cite web |last=Peterson |first=Jenna |date=6 Nov 2025 |title=Judge denies request to exempt Flock footage from Public Records Act |url=https://www.heraldnet.com/news/judge-denies-request-to-exempt-flock-footage-from-public-records-act/ |access-date=8 Nov 2025 |website=Herald Net}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The judge stated:&amp;lt;ref name=&amp;quot;:5&amp;quot; /&amp;gt;&amp;lt;blockquote&amp;gt;“I do think that the information at stake does have serious privacy implications, but that’s not the analysis for the intelligence information exemption,” she said. “You also have to make a finding that this is specific intelligence information that is compiled by investigative or law enforcement agencies, and the information that’s being compiled here does not relate to a specific case or investigation. The public already knows that these cameras exist and are operated. Many of them are in sight. The information does not disclose particular methods or procedures for gathering or evaluating intelligence information.” &amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Norfolk federal lawsuit &#039;&#039;(February 2025)&#039;&#039;===&lt;br /&gt;
In February 2025, Chief Judge Mark S. Davis of the U.S. District Court for the Eastern District of Virginia denied Norfolk&#039;s motion to dismiss a landmark Fourth Amendment lawsuit. The case involves two residents whose vehicles were tracked 526 times in 4.5 months and 849 times over the same period, figures revealed in a September 2025 court filing.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.nbcnews.com/tech/security/virginia-police-used-flock-cameras-track-driver-safety-lawsuit-surveil-rcna230399|title=Virginia police used Flock cameras to track driver 526 times in 4 months, lawsuit says|work=NBC News|date=2025-09-18|access-date=2025-08-23}}&amp;lt;/ref&amp;gt; Norfolk installed 172 Flock Safety cameras in 2023 at a cost of $430,000-$516,000 annually. Police Chief Mark Talbot stated the goal was making it &#039;&#039;&amp;quot;difficult to drive anywhere of any distance without running into a camera somewhere.&amp;quot;&#039;&#039;&amp;lt;ref name=&amp;quot;norfolk&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Judge Davis&#039;s ruling relied on &#039;&#039;Carpenter v. United States&#039;&#039;, the 2018 Supreme Court decision requiring warrants for historical cell phone location data. The court found Norfolk&#039;s ALPR network &amp;quot;notably similar&amp;quot; to the surveillance the Supreme Court deemed unconstitutional. However, courts remain divided. In November 2024, Senior U.S. District Judge Robert E. Payne in the same district denied a motion to suppress Flock evidence, holding that three vehicle snapshots don&#039;t constitute &amp;quot;persistent surveillance&amp;quot; requiring a warrant.&amp;lt;ref&amp;gt;{{cite web|url=https://valawyersweekly.com/2024/11/11/mosaic-theory-rejected-flock-camera-evidence-does-not-violate-fourth-amendment/|title=&#039;Mosaic theory&#039; rejected: Flock camera evidence does not violate Fourth Amendment|website=Virginia Lawyers Weekly|date=2024-11-11|access-date=2025-10-05}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Virginia state courts show similar disagreement. Norfolk Circuit Court Judge Jamilah LeCruise granted a suppression motion in May 2024, finding that the breadth of Flock cameras covering Norfolk requires a warrant.&amp;lt;ref&amp;gt;{{cite web|url=https://www.govtech.com/public-safety/virginia-judge-rejects-alpr-evidence-without-warrant|title=Virginia Judge Rejects ALPR Evidence Without Warrant|website=Government Technology|date=2024-05-15|access-date=2025-10-05}}&amp;lt;/ref&amp;gt; Yet three other Norfolk circuit court judges denied similar motions in 2024.&lt;br /&gt;
&lt;br /&gt;
===State regulatory landscape===&lt;br /&gt;
Only 16 states have enacted any form of ALPR regulation as of 2024 according to University of Michigan research.&amp;lt;ref&amp;gt;{{cite web|url=https://stpp.fordschool.umich.edu/news/2023/automated-license-plate-readers-widely-used-subject-abuse|title=Automated License Plate Readers widely used, subject to abuse|website=University of Michigan|date=2023|access-date=2025-10-05}}&amp;lt;/ref&amp;gt; Virginia enacted House Bill 2724 in 2025 creating annual reporting requirements.&amp;lt;ref&amp;gt;{{cite web|url=https://vscc.virginia.gov/Annual%20Reports/2024%20VSCC%20Annual%20Report%20-Law%20Enforcement%20Use%20of%20ALPR.pdf|title=2024 VSCC Annual Report - Law Enforcement Use of ALPR|website=Virginia State Crime Commission|date=2024|access-date=2025-10-05}}&amp;lt;/ref&amp;gt; Illinois Public Act 103-0540 explicitly prohibits use for reproductive healthcare punishment and immigration investigations.&amp;lt;ref&amp;gt;{{cite web|url=https://www.ilga.gov/legislation/publicacts/103/103-0540.htm|title=Public Act 103-0540|website=Illinois General Assembly|date=2024|access-date=2025-10-05}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Illinois prohibits law enforcement agencies from sharing ALPR data with other jurisdictions in relation to a person&#039;s immigration status.&amp;lt;ref&amp;gt;{{Cite web |title=Public Act 103-0540 |url=https://www.ilga.gov/documents/legislation/publicacts/103/PDF/103-0540.pdf |url-status=usurped |access-date=23 Aug 2025 |work=Illinois General Assembly}}&amp;lt;/ref&amp;gt; New Hampshire requires a three-minute purge of data from ALPR use with the exception of ongoing investigations. &amp;lt;ref&amp;gt;{{Cite web |title=261:75-b Use of Number Plate Scanning Devices Regulated. |url=https://law.justia.com/codes/new-hampshire/title-xxi/chapter-261/section-261-75-b/ |url-status=usurped |access-date=23 Aug 2025 |work=New Hampshire General Court}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
&lt;br /&gt;
California’s SB 34 requires public agencies using ALPR systems to implement usage and privacy policies as well as limits to data sharing. &amp;lt;ref name=&amp;quot;:3&amp;quot;&amp;gt;{{Cite web |url=https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201520160SB34 |title=SB-34 Automated license plate recognition systems: use of data |work=California Legislative Information |access-date=23 Aug 2025}}&amp;lt;/ref&amp;gt; However, enforcement remains inconsistent, with a 2020 state audit finding widespread non-compliance.&amp;lt;ref&amp;gt;{{Cite web |url=https://www.auditor.ca.gov/reports/2019-118/index.html |title=Automated License Plate Readers |work=California State Auditor |date=13 Feb 2020 |access-date=23 Aug 2025}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Notable incidents==&lt;br /&gt;
&lt;br /&gt;
====Illinois audit findings (2024-2025)====&lt;br /&gt;
Illinois Secretary of State Alexi Giannoulias announced in late August 2024 that Flock Safety violated state law by allowing U.S. Customs and Border Protection to access Illinois license plate data for immigration enforcement.&amp;lt;ref&amp;gt;{{cite web|url=https://www.flocksafety.com/blog/flock-safetys-response-to-illinois-lpr-data-use-and-out-of-state-sharing-concerns|title=Flock Safety&#039;s Response to Illinois LPR Data Use and Out-of-State Sharing Concerns|website=Flock Safety|date=2024-08-25|access-date=2025-10-05}}&amp;lt;/ref&amp;gt; The audit of 12 local law enforcement agencies revealed unauthorized pilot programs with CBP and Homeland Security Investigations, violating Illinois law prohibiting data sharing for immigration enforcement, gender-affirming care investigations, and abortion-related matters. Following the audit, 47 out-of-state agencies were removed from access to Illinois data.&amp;lt;ref&amp;gt;{{cite web|url=https://www.govtech.com/biz/flock-pledges-changes-after-illinois-data-sharing-accusation|title=Flock Pledges Changes After Illinois Data-Sharing Accusation|website=Government Technology|date=2024-08-15|access-date=2025-10-05}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Mount Prospect, Illinois reported 262 immigration-related license plate reader searches in just the first few months of 2025. A Palos Heights detective shared Flock login credentials with a DEA agent who conducted 28 unauthorized searches of Oak Park ALPR data explicitly labeled &amp;quot;immigration violation.&amp;quot;&amp;lt;ref name=&amp;quot;dea&amp;quot;&amp;gt;{{Cite web|url=https://unraveledpress.com/a-dea-agent-used-an-illinois-police-officers-flock-license-plate-reader-password-for-unauthorized-immigration-enforcement-searches/|title=DEA agent used Illinois cop&#039;s Flock license plate reader password for immigration enforcement searches|work=Unraveled Press|date=2025|access-date=2025-08-23}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====California violations (2015-2025)====&lt;br /&gt;
California passed Senate Bill 34&amp;lt;ref&amp;gt;{{Cite web|url=https://calmatters.digitaldemocracy.org/bills/ca_201520160sb34|title=Senate Bill 34|access-date=2025-08-27}}&amp;lt;/ref&amp;gt; in 2015 to limit how California police departments can use and share data collected from these cameras with other state&#039;s and federal law enforcement agencies. These limits have been found to be violated on several occasions with little enforcement or consequences for the misusing departments&amp;lt;ref&amp;gt;{{Cite web|url=https://sfstandard.com/2025/07/23/california-police-sharing-flock-license-plate-data/|access-date=2025-08-27|title=California cops are breaking surveillance laws|website=San Francisco Standard|date=2025-07-23}}&amp;lt;/ref&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
A 2023 EFF investigation found 71 California police agencies in 22 counties illegally shared data with out-of-state law enforcement. San Francisco Police Department alone allowed 1.6 million illegal searches by out-of-state agencies from 2024-2025.&amp;lt;ref&amp;gt;{{cite web|url=https://sfstandard.com/2025/09/08/sfpd-flock-alpr-ice-data-sharing/|title=SFPD let Georgia, Texas cops illegally search city surveillance data on behalf of ICE|website=San Francisco Standard|date=2025-09-08|access-date=2025-10-05}}&amp;lt;/ref&amp;gt; The California Attorney General filed the first enforcement action against the City of El Cajon in 2025 for sharing with 26 states.&amp;lt;ref&amp;gt;{{cite web|url=https://oag.ca.gov/news/press-releases/attorney-general-bonta-sues-el-cajon-illegally-sharing-license-plate-data-out|title=Attorney General Bonta Sues El Cajon for Illegally Sharing License Plate Data|website=California DOJ|date=2025|access-date=2025-10-05}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===False positive incidents===&lt;br /&gt;
&lt;br /&gt;
====Families detained at gunpoint====&lt;br /&gt;
In Española, New Mexico, 21-year-old Jaclynn Gonzales and her 12-year-old sister were held at gunpoint and handcuffed after Flock&#039;s system mistook a &amp;quot;2&amp;quot; for a &amp;quot;7&amp;quot; on their license plate, falsely flagging their vehicle as stolen.&amp;lt;ref&amp;gt;{{Cite news |date=2023-09-28 |title=License plate cover leads to traffic stop mishap |url=https://www.koat.com/article/espanola-police-license-plate-stolen-cover-traffic-stop/45361740|website=KOAT|access-date=2025-08-23}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=2025 |title=Flock Safety: Eroding Your Privacy &amp;amp; Keeping You Safe with Surveillance |url=https://redact.dev/blog/flock-safety-lpr-privacy-surveillance/ |access-date=2025-08-23 |work=Redact}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
ALPR systems often misread license plates according to multiple investigations, leading to hardship &amp;amp; legal trouble for innocent civilians.&amp;lt;ref&amp;gt;{{cite web|url=https://www.eff.org/deeplinks/2024/11/human-toll-alpr-errors|title=The Human Toll of ALPR Errors|website=Electronic Frontier Foundation|date=2024-11-15|access-date=2025-10-05}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
===Law enforcement stalking incidents===&lt;br /&gt;
 &lt;br /&gt;
In October 2022, Kechi, Kansas Police Lieutenant Victor Heiar was arrested and later pleaded guilty to computer crimes and stalking after using Flock cameras to track his estranged wife&#039;s movements over four months.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.kwch.com/2022/10/31/kechi-police-lieutenant-arrested-using-police-technology-stalk-wife/|title=Kechi police lieutenant arrested for using police technology to stalk wife|work=KWCH|date=2022-10-31|access-date=2025-08-23}}&amp;lt;/ref&amp;gt; In a separate Kansas incident, Sedgwick Police Chief Lee Nygaard accessed Flock data 164 times to track his ex-girlfriend before resigning after admitting to the misuse.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.yahoo.com/news/kansas-police-chief-used-flock-093300946.html|title=Kansas police chief used Flock license plate cameras 164 times to track ex-girlfriend|work=Yahoo News|date=2025|access-date=2025-08-23}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Multiple other documented cases include Las Vegas Metro Officer Christopher Young arrested in December 2023 for stalking his ex-fiancée using police databases, and Riverside County Deputy Eric Piscatella pleading guilty in February 2024 to seven counts of misusing sheriff&#039;s department databases to stalk a woman he met at Coachella.&amp;lt;ref&amp;gt;{{cite web|url=https://www.fox5vegas.com/2024/02/16/las-vegas-police-officer-arrested-reportedly-stalking-ex-fiancee/?outputType=amp|title=Las Vegas police officer arrested for reportedly stalking ex-fiancée|website=FOX5 Vegas|date=2024-02-16|access-date=2025-10-05}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
===Abortion and reproductive healthcare tracking===&lt;br /&gt;
In May 2025, Johnson County, Texas sheriff&#039;s deputies used Flock&#039;s network to track a woman suspected of self-managing an abortion. They conducted searches across 83,000+ Flock cameras nationwide with the explicit reason: &amp;quot;had an abortion, search for female.&amp;quot; The search accessed cameras across multiple states including those where abortion is legal. The incident led Illinois officials to investigate and subsequently block 47+ out-of-state agencies from accessing Illinois ALPR data.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.dallasnews.com/news/texas/2025/06/13/after-finding-fetal-remains-north-texas-cops-used-camera-network-to-search-for-woman/|title=After finding fetal remains, North Texas cops used camera network to search for woman|work=The Dallas Morning News|date=2025-06-13|access-date=2025-08-23}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web|url=https://www.eff.org/deeplinks/2025/05/she-got-abortion-so-texas-cop-used-83000-cameras-track-her-down|title=She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down|website=Electronic Frontier Foundation|date=2025-05-15|access-date=2025-10-05}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Investigations and court records show that some law enforcement officers have misused Flock Safety automated license plate reader (ALPR) systems for personal, non-investigative purposes, including stalking romantic partners or monitoring civilians. These incidents highlight weaknesses &amp;amp; lack of internal oversight, &amp;amp; the reliance on post-hoc audits rather than real-time safeguards.&lt;br /&gt;
&lt;br /&gt;
In Menasha, Wisconsin, police officer Cristian Morales was charged in January 2026 with misconduct in office after allegedly using the department’s Flock ALPR system to track his ex-girlfriend.&amp;lt;ref&amp;gt;{{cite news |title=Menasha police officer accused of using license plate recognition system to track his ex |work=FOX 11 News |date=2026-01-09 |url=https://fox11online.com/news/crime/menasha-police-officer-accused-of-using-license-plate-recognition-system-to-track-his-ex}}&amp;lt;/ref&amp;gt; Prosecutors alleged Morales conducted five unauthorized searches of his ex-partner’s vehicle in October 2025. According to the criminal complaint, Morales admitted he knew the searches were improper and cited “desperation and bad judgment.” He was placed on administrative leave, prohibited from accessing Flock systems, and released on a $10,000 cash bond pending further proceedings.&amp;lt;ref&amp;gt;{{cite news |title=Menasha police officer accused of using license plate recognition system to track his ex |work=FOX 11 News |date=2026-01-09}}&amp;lt;/ref&amp;gt; Court records also show a related civil filing seeking a temporary restraining order in a domestic abuse case.&amp;lt;ref&amp;gt;{{cite news |title=Menasha police officer accused of using license plate recognition system to track his ex |work=FOX 11 News |date=2026-01-09}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Menasha case matches what is becoming a national pattern. In Kansas, Kechi Police Lieutenant Victor Heiar pleaded guilty in 2022 to computer crimes &amp;amp; stalking after using Flock cameras to monitor his estranged wife’s movements over several months.&amp;lt;ref&amp;gt;{{cite news |title=Kechi police lieutenant arrested for using police technology to stalk wife |work=KWCH |date=2022-10-31 |url=https://www.kwch.com/2022/10/31/kechi-police-lieutenant-arrested-using-police-technology-stalk-wife/}}&amp;lt;/ref&amp;gt; In another Kansas incident, Sedgwick Police Chief Lee Nygaard admitted in 2025 to accessing Flock ALPR data more than 160 times to track his ex-girlfriend and her new partner, resulting in his resignation and loss of police certification.&amp;lt;ref&amp;gt;{{cite news |title=Kansas police chief used Flock license plate cameras to track ex-girlfriend |work=Yahoo News |date=2025 |url=https://www.yahoo.com/news/kansas-police-chief-used-flock-093300946.html}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
More cases involving other surveillance systems show a similar misuse. Las Vegas Metropolitan Police officer Christopher Young was arrested in 2023 for stalking his ex-fiancée using police databases, and in California, Riverside County deputy Eric Piscatella pleaded guilty in 2024 to multiple counts of misusing sheriff’s department databases to stalk a woman he met while off duty.&amp;lt;ref&amp;gt;{{cite news |title=Las Vegas police officer arrested for reportedly stalking ex-fiancée |work=FOX5 Vegas |date=2024-02-16 |url=https://www.fox5vegas.com/2024/02/16/las-vegas-police-officer-arrested-reportedly-stalking-ex-fiancee/}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Oversight reviews &amp;amp; civil liberties organizations have noted that ALPR systems enable quick searches of historical vehicle location data across wide geographic areas. This reduces practical barriers to stalking &amp;amp; increases the risk of abuse by authorized users. While Flock &amp;amp; participating agencies rely on usage policies &amp;amp; access logs, many cases show misuse was detected only after complaints or later audits rather than through proactive safeguards.&amp;lt;ref&amp;gt;{{cite web |title=Automated License Plate Readers widely used, subject to abuse |work=University of Michigan |date=2023 |url=https://stpp.fordschool.umich.edu/news/2023/automated-license-plate-readers-widely-used-subject-abuse}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web |title=ALPR Audit Takeaways: What We Learned About Policy Gaps |work=Government Technology |date=2024 |url=https://www.govtech.com/biz/data/alpr-audit-takeaways-what-we-learned-about-policy-gaps}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Federal agency access===&lt;br /&gt;
Immigration and Customs Enforcement maintains a $6.1 million contract giving 9,000+ ICE officers access to the Vigilant Solutions ALPR database containing over 5 billion location data points.&amp;lt;ref&amp;gt;{{cite web|url=https://www.aclu.org/news/immigrants-rights/documents-reveal-ice-using-driver-location-data|title=Documents Reveal ICE Using Driver Location Data From Local Police for Deportations|website=ACLU|date=2024|access-date=2025-10-05}}&amp;lt;/ref&amp;gt; The Drug Enforcement Administration operates a National License Plate Reader Program with over 10,000 license plate readers shared throughout the United States. 404 Media revealed over 4,000 searches by local and state police for federal immigration enforcement purposes, despite Flock having no formal ICE contract.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.404media.co/ice-taps-into-nationwide-ai-enabled-camera-network-data-shows/|title=ICE Taps into Nationwide AI-Enabled Camera Network, Data Shows|work=404 Media|date=2025|access-date=2025-08-23}}&amp;lt;/ref&amp;gt; A DEA agent was found using an Illinois police officer&#039;s credentials to conduct unauthorized immigration searches.&amp;lt;ref name=&amp;quot;dea&amp;quot; /&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
===Illegal Camera Installations===&lt;br /&gt;
In South Carolina, Flock installed over 200 cameras without authorization, leading to a statewide moratorium on new installations.&amp;lt;ref&amp;gt;{{Cite web |last=Ferrara |first=David |date=2024-03-11 |title=A company installed license plate cameras without permission. SC agency wants clear rules |url=https://www.postandcourier.com/news/alpr-cameras-south-carolina-flock-safety-license-plate-readers/article_787a262a-dbd2-11ee-a901-634acead588b.html |url-status=live |access-date=2025-08-25 |website=The Post and Courier}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
 &lt;br /&gt;
In Illinois, a Flock representative allegedly threatened a Department of Transportation official with police pressure when questioned about permit applications.&amp;lt;ref&amp;gt;{{Cite web |last=Uprise RI Staff |date=2024-10-23 |title=As Flock Surveillance Cameras Proliferate in Rhode Island, Lawsuit Challenges Their Legality |url=https://upriseri.com/as-flock-surveillance-cameras-proliferate-in-rhode-island-lawsuit-challenges-their-legality/ |url-status=live |access-date=2025-08-25 |website=UPRISE RI}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
=====&#039;&#039;&#039;Evanston, IL&#039;&#039;&#039;=====&lt;br /&gt;
Flock was ordered to remove 18 stationary cameras. The city put the contract with Flock on a 30-day termination notice on August 26. Flock Initially appeared to comply, removing 15 of the cameras by September 8. Later, Flock was caught reinstalling all of them by the following Tuesday without authorization from the city. The city of Evanston responded with a cease-and-desist order for Flock to remove the new and unauthorized camera equipment. Because Flock reinstalled the cameras without permission, Evanston was forced to cover the cameras with tape and bags to block them from potentially logging vehicle data.&amp;lt;ref&amp;gt;{{Cite web |last=Harrison |first=Alex |date=2025-09-25 |title=City covers Flock cameras while waiting for removal |url=https://evanstonroundtable.com/2025/09/25/city-covers-up-flock-cameras-while-waiting-for-removal/ |url-status=live |archive-url=https://archive.ph/PD1qe |archive-date=2025-10-10 |access-date=2025-10-10 |website=Evanston Roundtable}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
===City rejections and terminations===&lt;br /&gt;
 &lt;br /&gt;
Multiple cities have rejected or terminated Flock contracts following privacy concerns and effectiveness issues:&lt;br /&gt;
 &lt;br /&gt;
&#039;&#039;&#039;0.2% effectiveness rate, low arrests:&#039;&#039;&#039; Austin, Texas terminated its contract in July 2025 after an audit revealed &amp;quot;systematic compliance failures&amp;quot; and only 165 arrests from 113 million license plate scans (0.146% effectiveness rate).&amp;lt;ref&amp;gt;{{Cite web|url=https://cbsaustin.com/news/local/flock-ceo-responds-to-austin-backlash-as-city-contract-nears-expiration|title=Flock CEO responds to Austin backlash as city contract nears expiration|work=CBS Austin|date=2025-06-21|access-date=2025-08-23}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Denver City Council unanimously rejected a $666,000 contract extension in May 2025 following revelations of 1,400+ ICE-related searches in Colorado data.&amp;lt;ref&amp;gt;{{Cite web|url=https://denverite.com/2025/05/05/denver-rejects-flock-camera-license-plate-readers/|title=Denver rejects $666,000 extension for license-plate surveillance cameras after backlash|work=Denverite|date=2025-05-05|access-date=2025-08-23}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
San Marcos, Texas voted 5-2 to deny camera expansion after discovering no required audits had been conducted since 2022.&amp;lt;ref&amp;gt;{{Cite web |last=Velez |first=Abigail |date=2025-06-04 |title=San Marcos City Council votes to deny flock camera expansion after hours of heated debate |url=https://cbsaustin.com/news/local/san-marcos-city-council-votes-to-deny-flock-camera-expansion-after-hours-of-heated-debate |access-date=2025-08-23 |work=CBS Austin}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Oak Park, Illinois terminated their contract entirely following the Illinois investigation into illegal data sharing.&amp;lt;ref&amp;gt;{{Cite web|url=https://www.oakpark.com/2025/08/07/oak-park-terminates-flock-license-plate-reader-contract/|title=Oak Park terminates Flock license plate reader contract|work=Wednesday Journal|date=2025-08-07|access-date=2025-08-23}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Arizona deployments===&lt;br /&gt;
Sedona, Arizona became the first Arizona city to completely terminate its Flock Safety contract in September 2025 after citizen backlash. The city had installed 11 cameras in June 2025 without prior public notice at a cost of $51,146 for the first year. The council voted 5-1 to pause the program, then unanimously 7-0 on September 9 to permanently terminate after Flock CEO Garrett Langley admitted the company had been sharing data with federal agencies. Vice Mayor Holli Ploog called Flock &amp;quot;not an honorable company&amp;quot; for the conflicting data-sharing claims.&amp;lt;ref&amp;gt;{{cite web|url=https://westvalleyfamilies.substack.com/p/sedona-pulls-the-plug-on-flock-safety|title=Sedona Pulls the Plug on Flock Safety|website=West Valley Families|date=2025-09-10|access-date=2025-10-05}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web|url=https://www.knau.org/knau-and-arizona-news/2025-09-11/sedona-council-permanently-ends-license-plate-camera-program|title=Sedona council permanently ends license plate camera program|website=KNAU|date=2025-09-11|access-date=2025-10-05}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Flagstaff deployed 32 Flock cameras in summer 2024 at a cost of $143,100 annually. By September 2025, a petition signed by 25+ residents demanded cancellation.&amp;lt;ref&amp;gt;{{cite web|url=https://www.kjzz.org/fronteras-desk/2025-09-01/after-sedona-paused-flock-safety-camera-system-flagstaff-is-considering-the-same-issue|title=After Sedona paused Flock Safety camera system, Flagstaff is considering the same issue|website=KJZZ|date=2025-09-01|access-date=2025-10-05}}&amp;lt;/ref&amp;gt; &lt;br /&gt;
 &lt;br /&gt;
University of Arizona contracted with Flock in February 2025 for 54 ALPR cameras at $160,000 annually. Students and faculty launched a &amp;quot;Deflock Tucson&amp;quot; campaign citing concerns about tracking international students and potential data sharing with federal immigration authorities.&amp;lt;ref&amp;gt;{{cite web|url=https://azluminaria.org/2025/09/15/ua-students-and-faculty-question-use-of-flock-safety-cameras-on-campus/|title=UA students and faculty question use of Flock Safety cameras on campus|website=AZ Luminaria|date=2025-09-15|access-date=2025-10-05}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Casa Grande approved a $10 million &amp;quot;Safe City Initiative&amp;quot; in September 2025 including 100 license plate readers. Chief Mark McCrory reported the current 22 license plate readers led to 212 stolen vehicles identified and 168 arrests.&amp;lt;ref&amp;gt;{{cite web|url=https://www.inmaricopa.com/we-mapped-all-flock-cameras/|title=We mapped the city&#039;s Flock cameras|website=InMaricopa|date=2025|access-date=2025-10-05}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
Despite documented deployments across Arizona including Phoenix, Mesa, Chandler, Scottsdale, Tempe, Surprise, Youngtown, Litchfield Park, and Yuma, the state has no ALPR-specific regulation.&amp;lt;ref&amp;gt;{{cite web|url=https://azmirror.com/2019/07/08/how-do-automated-license-plate-readers-work/|title=How do automated license plate readers work?|website=Arizona Mirror|date=2019-07-08|access-date=2025-10-05}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Security vulnerabilities==&lt;br /&gt;
In 2025, Flock Safety reported security vulnerabilities in its devices and submitted them to MITRE for inclusion in the National Vulnerability Database, including issues such as hard-coded credentials and improper access controls.&amp;lt;ref&amp;gt;{{Cite web |date=2025-05-05 |title=Gunshot Detection and License Plate Reader Security Alert |url=https://www.flocksafety.com/blog/gunshot-detection-and-license-plate-reader-security-alert |website=Flock Safety}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=2025-10-02 |title=CVE-2025-59403 : The Flock Safety Android Collins application (aka com.flocksafety.android.collin |url=https://www.cvedetails.com/cve/CVE-2025-59403/ |website=CVEdetails.com}}&amp;lt;/ref&amp;gt;  Similar security concerns have affected other ALPR systems, including exposure of default passwords and unencrypted data storage.&amp;lt;ref name=&amp;quot;:4&amp;quot;&amp;gt;{{Cite web |last=Quintin |first=Cooper |date=28 Oct 2015 |title=License Plate Readers Exposed! How Public Safety Agencies Responded to Major Vulnerabilities in Vehicle Surveillance Tech |url=https://www.eff.org/ur/deeplinks/2015/10/license-plate-readers-exposed-how-public-safety-agencies-responded-massive |website=Electronic Frontier Foundation}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This represents one of several major security disclosures in the past decade. In 2015, the Electronic Frontier Foundation documented more than 100 ALPR cameras accessible on the open internet, often without passwords or proper configuration.&amp;lt;ref name=&amp;quot;:4&amp;quot; /&amp;gt; A more serious documented breach occurred in 2019, when Perceptics, LLC, a subcontractor for U.S. Customs and Border Protection, exposed approximately 105,000 license plate images and 184,000 traveler facial images.&amp;lt;ref&amp;gt;{{Cite web |title=Review of CBP&#039;s Major Cybersecurity Incident During a 2019 Biometric Pilot |url=https://www.oig.dhs.gov/sites/default/files/assets/2020-09/OIG-20-71-Sep20.pdf}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
In 2025 it has been discovered that the cameras run [[wikipedia:Android_Oreo|Android 8.0 (Oreo)]] an operating system with 90 security vulnerabilities.  The cameras also send data unencrypted and are easily tricked by stingrays.  The compute boxes have easily accessible USB-c ports leaving the device vulnerable to rubber duckies.  When the power button is pressed in a specific order the device emits a Wi-Fi hotspot that can be used to gain adb access.&amp;lt;ref&amp;gt;{{Cite web |last=Benn |first=Jordan |date=2025-11-16 |title=We Hacked Flock Safety Cameras in under 30 Seconds. |url=https://www.youtube.com/watch?v=uB0gr7Fh6lY |website=YouTube}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Government accountability and oversight==&lt;br /&gt;
&lt;br /&gt;
===State audit findings===&lt;br /&gt;
California State Auditor&#039;s February 2020 investigation found the Los Angeles Police Department (LAPD), with a 320 million image database, had no ALPR-specific policy at all. The audit found 96% of agencies claim to have policies, but most are incomplete. Data retention periods varied wildly with no justification. LAPD maintained a minimum five-year retention period, yet couldn&#039;t demonstrate that images stored for years had investigative value. The audit found that 99.9% of the 320 million images Los Angeles stores are for vehicles that were not on a &amp;quot;hot list&amp;quot; when the image was made.&amp;lt;ref&amp;gt;{{Cite web |url=https://information.auditor.ca.gov/reports/2019-118/summary.html |title=Automated License Plate Readers |website=California State Auditor |date=13 Feb 2020 |access-date=5 Oct 2025}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
New Jersey provides a contrasting model with mandatory annual audits of all 523 law enforcement agencies. The 2024 audit reported only two significant violations, both involving users who hadn&#039;t completed required training.&amp;lt;ref&amp;gt;{{Cite web |url=https://nj.gov/njsp/ALPR/pdf/2024_Audit_Automated_License_Plate_Recognition_(ALPR)_Data_Collected_Utilized_NJ_Law_Enforcement_Agencies.pdf |title=2024 Audit of Automated License Plate Recognition (ALPR) Data |website=New Jersey State Police |date=2024 |access-date=5 Oct 2025 |format=PDF}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Government Technology analysis found that agencies often fail to audit ALPR systems regularly, leaving them &amp;quot;open to abuse by neglecting to institute sufficient oversight.&amp;quot;&amp;lt;ref&amp;gt;{{Cite web |url=https://www.govtech.com/biz/data/alpr-audit-takeaways-what-we-learned-about-policy-gaps |title=ALPR Audit Takeaways: What We Learned About Policy Gaps |website=Government Technology |date=2024 |access-date=5 Oct 2025}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Cost-benefit analysis===&lt;br /&gt;
Arizona Department of Transportation&#039;s 2008 study of generic ALPR technology (predating Flock Safety by nine years) estimated $9.98 million for a hypothetical statewide ALPR system. The projected benefit-to-cost ratio of 9.6:1 came entirely from registration and insurance compliance, not crime reduction.&amp;lt;ref&amp;gt;{{Cite web |url=https://apps.azdot.gov/files/ADOTLibrary/publications/project_reports/PDF/AZ637.pdf |title=Automated License Plate Recognition Technology Implementation Report |website=Arizona Department of Transportation |date=1 Jun 2008 |access-date=5 Oct 2025}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Colorado&#039;s Office of Research and Statistics reported that while ALPR systems are expanding, independent academic research contradicts vendor claims. A 2011 George Mason University study concluded ALPRs &amp;quot;do not achieve a prevention or deterrent effect&amp;quot; on crime.&amp;lt;ref&amp;gt;{{Cite web |url=https://cdpsdocs.state.co.us/ors/Docs/Briefs/2024-05_InDetail-ALPR.pdf |title=Automated License Plate Readers (In Detail) |website=Colorado Division of Criminal Justice |date=1 May 2024 |access-date=5 Oct 2025 |format=PDF}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Oakland Police Department reported 182 arrests from ALPR in the first year, representing 1.4% of homicides, robberies, burglaries, and firearm assaults. The Northern California Regional Intelligence Center states approximately 1-2 vehicles out of 1,000 initiate alerts — a hit rate of just 0.1-0.2%.&amp;lt;ref&amp;gt;{{Cite web |url=https://ncric.ca.gov/wp-content/uploads/2021/10/California-Law-Enforcement-ALPR-FAQ.pdf |title=California Law Enforcement ALPR FAQ |website=NCRIC |date=2021 |access-date=5 Oct 2025 |format=PDF}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Mountain View Findings===&lt;br /&gt;
&lt;br /&gt;
The Mountain View Police Department became aware in early January in 2026 during a department-initiated audit that for a brief period in 2024 federal agencies accessed data from the first camera in operation in the city.&lt;br /&gt;
&lt;br /&gt;
“During the prior federal administration, from August to November 2024, several federal law enforcement agencies accessed Mountain View’s Flock Safety ALPR system for one camera via a &#039;nationwide&#039; search setting that was turned on by Flock Safety. This setting was enabled without MVPD’s permission or knowledge. The federal agencies that accessed the one camera’s data include Bureau of Alcohol, Tobacco, Firearms and Explosives offices in Kentucky and Nashville, TN; Langley Air Force Base in Virginia; the U.S. GSA Office of Inspector General; Lake Mead National Recreation Area in Nevada; and an Ohio Air Force Base. Flock Safety did not retain records for that time period, which means the vendor cannot determine whether searches of Mountain View’s data resulted in license plate information being shared.”&amp;lt;ref&amp;gt;{{Cite web |date=2026-01-30 |title=City Statement {{!}} City News {{!}} Mountain View, CA |url=https://www.mountainview.gov/Home/Components/News/News/1203/284 |url-status=live |archive-url=https://archive.md/CDZ2Y |archive-date=2026-02-07 |access-date=2026-02-07 |website=mountainview.gov}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
MVPD officers also uncovered that “statewide lookup” had been turned on for all the city’s cameras since the program began. This feature has been turned off by the department on January 5, 2026. The MVPD plans to present a review of the ALPR pilot program to the City Council. &lt;br /&gt;
&lt;br /&gt;
On February 2, 2026 Mountain View Police Chief Mike Canfield announced that all of the city&#039;s license plate cameras are being disabled, effective immediately.&amp;lt;ref&amp;gt;{{Cite web |last=Margaretten |first=Emily |last2=Morgan |first2=Zoe |date=2026-01-30 |title=Mountain View discovers unauthorized access to license plate data |url=https://www.mv-voice.com/police/2026/01/30/amid-immigration-crackdown-mountain-view-discovers-unauthorized-access-to-license-plate-data/ |url-status=live |archive-url=https://archive.md/xjjvu |archive-date=2026-01-31 |access-date=2026-02-07 |website=Mountain View Voice}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Camera locations==&lt;br /&gt;
The locations of many Flock Cameras have been mapped by the OpenStreetMap project. A viewer of the locations of these cameras is located here: [https://deflock.me/map ALPR Map &amp;amp;#124; DeFlock]&lt;br /&gt;
&lt;br /&gt;
====Cease and desist to DeFlock.me====&lt;br /&gt;
DeFlock.me is a website allowing users to log and view the locations of ALPRs, such as Flock products. On 30 January 2025, Flock sent a cease and desist notice to the owner of DeFlock demanding the name of the website be changed to exclude the company&#039;s brand name. The letter also stated that &amp;quot;the Website also implies that various license plate readers are vulnerable to security hacks [...]&amp;quot; which Flock alleged &amp;quot;[...] provides a false impression about the security of Flock Products.&amp;quot;&amp;lt;ref&amp;gt;{{Cite web |last=Matz |first=Sarah M. |title=2025 01 31 DEFLOCK CD final |url=https://www.eff.org/files/2025/02/26/2025_01_31_deflock_cd_ex-3.pdf |website=Electronic Frontier Foundation |date=30 Jan 2025 |access-date=27 Oct 2025 |url-status=live |format=PDF}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
*[https://deflock.me/ DeFlock live map of active ALPRs]&lt;br /&gt;
*[https://www.noalprs.org/ No ALPRS movement in United States]&lt;br /&gt;
*[https://plateprivacy.com/ The Plate Privacy Project]&lt;br /&gt;
*[https://eyesonflock.com/ Eyes On Flock]&lt;br /&gt;
*[https://wiki.alprwatch.org/index.php/Main_Page ALPR Watch Wiki]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{Reflist}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Automatic license plate readers]]&lt;br /&gt;
[[Category:Flock Safety]]&lt;/div&gt;</summary>
		<author><name>Snarfblat</name></author>
	</entry>
	<entry>
		<id>https://consumerrights.wiki/index.php?title=ReCAPTCHA&amp;diff=37816</id>
		<title>ReCAPTCHA</title>
		<link rel="alternate" type="text/html" href="https://consumerrights.wiki/index.php?title=ReCAPTCHA&amp;diff=37816"/>
		<updated>2026-02-20T14:31:05Z</updated>

		<summary type="html">&lt;p&gt;Snarfblat: Cited and reworded claim about Google making reCAPTCHA succeed more often on Chromium-based browsers.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{ProductCargo&lt;br /&gt;
|ArticleType=&lt;br /&gt;
|Category=Software, CAPTCHA&lt;br /&gt;
|Company=Google&lt;br /&gt;
|Description=&lt;br /&gt;
|InProduction=Yes&lt;br /&gt;
|Logo=ReCAPTCHA.svg&lt;br /&gt;
|ProductLine=&lt;br /&gt;
|ReleaseYear=2007&lt;br /&gt;
|Website=https://google.com/recaptcha&lt;br /&gt;
}}&lt;br /&gt;
{{lowercase title}}&lt;br /&gt;
[[wikipedia:ReCAPTCHA|&#039;&#039;&#039;reCAPTCHA&#039;&#039;&#039;]] was acquired by [[Google]] in 2009 and has since been used to protect websites from [[wikipedia:Internet_bot|botting]], crowdsource transcription work, and to mass train Google&#039;s other technical ventures such as artificial intelligence.&amp;lt;ref&amp;gt;{{Cite web |last=von Ahn |first=Luis |last2=Cathcart |first2=Will |date=16 Sep 2009 |title=Teaching computers to read: Google acquires reCAPTCHA |url=https://googleblog.blogspot.com/2009/09/teaching-computers-to-read-google.html |url-status=live |archive-url=https://web.archive.org/web/20090917225140/https://googleblog.blogspot.com/2009/09/teaching-computers-to-read-google.html |archive-date=17 Sep 2009 |website=Google Blog}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{cite web |author=&amp;lt;!-- not stated --&amp;gt;|title= Google recaptcha intro on using reCaptcha to improve automation  |url=https://www.google.com/recaptcha/intro/?hl=es/index.html#:~:text=Every%20time%20our%20CAPTCHAs%20are,and%20solve%20hard%20AI%20problems. |website=google.com |access-date=2025-02-15}}&amp;lt;/ref&amp;gt; Google faced criticism over this crowdsourcing and training for using unpaid labor from millions of daily users around the world, even sparking an ultimately unsuccessful class action lawsuit in Massachusetts in 2015, with the court dismissing the amount of time spent by each user completing a CAPTCHA as &amp;quot;something for which [no] reasonable consumer would expect to receive compensation&amp;quot;.&amp;lt;ref&amp;gt;{{Cite web |date=22 Jan 2015 |title=Civil Action No. 15-10160-MGM |url=https://digitalcommons.law.scu.edu/cgi/viewcontent.cgi?article=1904&amp;amp;context=historical |website=United States District Court for the District of Massachusetts}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |date=3 Feb 2016 |title=Case No. 15-cv-03751-JSC |url=https://casetext.com/case/rojas-lozano-ex-rel-all-other-persons-similarly-situated-v-google-inc |website=United States District Court for the Northern District of California}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A video published by YouTube channel CHUPPL sparked renewed controversy with a video released in December 2024. The video cites and details how reCAPTCHA [[wikipedia:Doxing|doxxes]] users and how resulting user data can end up in the hands of the US government for unknown purposes, claiming exploitation of an intentional loophole in Google&#039;s terms of service allowing them to transmit user device and application data under the guise of &amp;quot;general security purposes.&amp;quot;&amp;lt;ref&amp;gt;{{Cite web |last=CHUPPL |date=5 Dec 2024 |title=Why reCAPTCHA is Spyware |url=https://www.youtube.com/watch?v=VTsBP21-XpI |via=YouTube}}&amp;lt;/ref&amp;gt; User data allegedly began being collected in 2014, when Google deployed reCAPTCHA v2, specifically the “No CAPTCHA reCAPTCHA” i.e. &amp;quot;the checkbox CAPTCHA,&amp;quot; which primarily uses [[wikipedia:HTTP_cookie|cookies]] to whitelist users who reCAPTCHA identifies as humans. This opens up additional security vulnerabilities as once a user is identified as a human, a bot can take over and be given unrestricted access to all sites using reCAPTCHA without having to fill a CAPTCHA itself.&amp;lt;ref&amp;gt;{{Cite web |last=homakov |date=4 Dec 2014 |title=The No CAPTCHA problem |url=https://homakov.blogspot.com/2014/12/the-no-captcha-problem.html |url-status=live |archive-url=https://web.archive.org/web/20141204133024/https://homakov.blogspot.com/2014/12/the-no-captcha-problem.html |archive-date=4 Dec 2014 |via=Blogger}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The type of cookies collected includes, but is not limited to:&amp;lt;ref name=&amp;quot;:0&amp;quot;&amp;gt;{{Cite web |last=O&#039;Reilly |first=Lara |date=20 Feb 2015 |title=Google&#039;s new CAPTCHA security login raises &#039;legitimate privacy concerns&#039; |url=https://www.businessinsider.com/google-no-captcha-adtruth-privacy-research-2015-2 |url-status=live |archive-url=https://web.archive.org/web/20150222100003/https://www.businessinsider.com/google-no-captcha-adtruth-privacy-research-2015-2 |archive-date=22 Feb 2015 |website=Business Insider}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Screen size and resolution, date, language, browser plug-ins, and all Javascript objects&lt;br /&gt;
*IP address&lt;br /&gt;
*CSS information from the page you are on&lt;br /&gt;
*A count of mouse and touch events&lt;br /&gt;
&lt;br /&gt;
This digital fingerprinting is nearly inescapable even for privacy focused consumers since, as of November 2024, reCAPTCHA is employed in 84% of all websites.&amp;lt;ref&amp;gt;{{Cite web |title=CAPTCHA Usage Distribution in the Top 1 Million Sites |url=https://trends.builtwith.com/widgets/captcha |website=BuiltWith}}&amp;lt;/ref&amp;gt;&amp;lt;blockquote&amp;gt;&amp;quot;The implication is that Google isn’t just looking to identify whether you’re a human with its No CAPTCHA, but potentially exactly &#039;&#039;which human&#039;&#039; you are.&amp;quot; - Lara O&#039;Reilly&amp;lt;ref name=&amp;quot;:0&amp;quot; /&amp;gt;&amp;lt;/blockquote&amp;gt;A 2023 study collected data on newly admitted students to UC Irvine&#039;s School of Information &amp;amp; Computer Sciences over 13 months and concludes that reCAPTCHA does not provide real security for Google&#039;s client websites and has, over its 13 years of existence, cost users an estimated 819 million hours equating to nearly $6 billion USD in wages and 134 petabytes of bandwidth corresponding to 7.5 million pounds of CO&amp;lt;sub&amp;gt;2&amp;lt;/sub&amp;gt;. The study further estimated Google&#039;s direct profits from reCAPTCHA to be &amp;quot;$888 billion USD from cookies and $8.75-32.3 billion USD per each sale of their total labeled data set.&amp;quot;&amp;lt;ref name=&amp;quot;:1&amp;quot;&amp;gt;{{Cite journal |last=Searles |first=Andrew |last2=Prapty |first2=Renascence Tarafder |last3=Tsudik |first3=Gene |date=21 Nov 2023 |title=Dazed &amp;amp; Confused: A Large-Scale Real-World User Study of reCAPTCHAv2 |url=https://arxiv.org/pdf/2311.10911 |journal=Preprint}}&amp;lt;/ref&amp;gt;&amp;lt;blockquote&amp;gt;&amp;quot;It can be concluded that the true purpose of reCAPTCHAv2 is as a tracking cookie farm for advertising profit masquerading as a security service.&amp;quot; - Searles, Prapty, and Tsudik&amp;lt;ref name=&amp;quot;:1&amp;quot; /&amp;gt;&amp;lt;/blockquote&amp;gt;Some commentators have alleged that reCAPTCHA’s risk scoring and challenge behavior can differ by browser, with Chrome/Chromium users sometimes reporting fewer challenges than users of other browsers.&amp;lt;ref&amp;gt;{{Cite web |title=Google&amp;amp;apos;s reCAPTCHA test has been tricked by artificial intelligence |website=The Register |date=2019-06-28 |url=https://www.theregister.com/2019/06/28/google_recaptcha_favoring_google/ |access-date=2026-02-20}}&amp;lt;/ref&amp;gt; Users of a Hacker News forum concluded that reCAPTCHA likely attributes a lower reputation score to users with privacy-focused applications and extensions running, thus [[Firefox]] users were assigned CAPTCHAs to solve at a higher rate and difficulty.&amp;lt;ref&amp;gt;{{Cite web |last=kojoru |date=10 Jun 2019 |title=Google&#039;s Captcha in Firefox vs. in Chrome |url=https://news.ycombinator.com/item?id=20147015 |via=Y Combinator}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
reCAPTCHA v3, the &amp;quot;Invisible reCAPTCHA,&amp;quot; launched in 2017 with the goal of never interrupting legitimate human users.&amp;lt;ref&amp;gt;{{Cite web |last=Verger |first=Rob |date=11 Mar 2017 |title=Google just made the internet a tiny bit less annoying |url=https://www.popsci.com/google-invisible-recaptcha/ |url-status=live |archive-url=https://web.archive.org/web/20241123014232/https://www.popsci.com/google-invisible-recaptcha/ |archive-date=23 Nov 2024 |website=Populair Science}}&amp;lt;/ref&amp;gt; This version works completely in the background using cookies to apply a reputation scored on a scale from 0.0 to 1.0, with the latter indicating high confidence a user is human.&amp;lt;ref&amp;gt;{{Cite web |title=reCAPTCHA v3 |url=https://developers.google.com/recaptcha/docs/v3 |website=Google for Developers}}&amp;lt;/ref&amp;gt;&amp;lt;ref&amp;gt;{{Cite web |title=reCAPTCHA v3 score detector |url=https://antcpt.com/score_detector/}}&amp;lt;/ref&amp;gt; A 2019 study on hacking version 3 revealed that reCAPTCHA assigned low scores to simulated users using [[TOR browser]] and that browsers with an active Google account connected received higher scores as compared to browsers without a Google account connected.&amp;lt;ref&amp;gt;{{Cite journal |last=Akrout |first=Ismail |last2=Feriani |first2=Amal |last3=Akrout |first3=Mohamed |date=18 Apr 2019 |title=Hacking Google reCAPTCHA v3 using Reinforcement Learning |url=https://arxiv.org/pdf/1903.01003 |journal=Preprint}}&amp;lt;/ref&amp;gt; Technology consultant Marcos Perona observed similar results and experienced low reputation scores when using a [[VPN]], too. Google recommends implementing reCAPTCHA v3 in the background of all client webpages, so that it collects user data prior to it needing to determine if the user is a bot.&amp;lt;ref name=&amp;quot;:2&amp;quot;&amp;gt;{{Cite web |last=Schwab |first=Katharine |date=27 Jun 2019 |title=Google’s new reCAPTCHA has a dark side |url=https://www.fastcompany.com/90369697/googles-new-recaptcha-has-a-dark-side |url-status=live |archive-url=https://web.archive.org/web/20190627144558/https://www.fastcompany.com/90369697/googles-new-recaptcha-has-a-dark-side |archive-date=27 Jun 2019 |website=Fast Company}}&amp;lt;/ref&amp;gt;&amp;lt;blockquote&amp;gt;&amp;quot;Because reCaptcha v3 is likely to be on every page of a website,  if you’re signed into your Google account there’s a chance Google is getting data about every single webpage you go to that is embedded with reCaptcha v3—and there many be no visual indication on the site that it’s happening, beyond a small reCaptcha logo hidden in the corner&amp;quot; - Katharine Schwab&amp;lt;ref name=&amp;quot;:2&amp;quot; /&amp;gt;[[File:Invisible-reCaptcha-in-Corner.png|thumb|375px|reCAPTCHA logo in corner of webpage indicating user&#039;s behaviors are being analyzed.]]&amp;lt;/blockquote&amp;gt;&lt;br /&gt;
&lt;br /&gt;
reCAPTCHA&#039;s shortcomings as summarized by one of their direct competitors, DataDome:&amp;lt;ref&amp;gt;{{Cite web |date=20 Aug 2022 |title=ReCAPTCHA v2 vs. v3: Efficient bot protection? |url=https://datadome.co/guides/captcha/recaptchav2-recaptchav3-efficient-bot-protection/ |url-status=live |archive-url=https://web.archive.org/web/20240211073038/https://datadome.co/guides/captcha/recaptchav2-recaptchav3-efficient-bot-protection/ |archive-date=11 Feb 2024 |website=Data Dome}}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*Degrade the user experience.&lt;br /&gt;
*Can lead to high false positives and false negatives.&lt;br /&gt;
*Fail to be privacy compliant with GDPR, the foundational global privacy standard.&lt;br /&gt;
*Leverage [...] users’ data for their organization’s advertising purposes.&lt;br /&gt;
*Are easily bypassed with CAPTCHA farms and advanced bots.&lt;br /&gt;
*Provide no real feedback mechanisms (pass/fail is not enough information to refine your security).&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
&lt;br /&gt;
*[[CAPTCHA]]&lt;br /&gt;
*[[DataDome]]&lt;br /&gt;
*[[hCAPTCHA]]&lt;br /&gt;
*[[Privacy Pass]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&amp;lt;references /&amp;gt;&lt;br /&gt;
[[Category:CAPTCHA]]&lt;br /&gt;
[[Category:Google]]&lt;br /&gt;
[[Category:Data collection]]&lt;/div&gt;</summary>
		<author><name>Snarfblat</name></author>
	</entry>
</feed>