Flock license plate readers: Difference between revisions
m source check, (revert if breaks something) |
[For Keith] Usurp Changed for links I'm getting 404's on (REVERT IF BAD) |
||
| Line 37: | Line 37: | ||
===Premise of a "license plate camera"=== | ===Premise of a "license plate camera"=== | ||
While marketed as an automatic license plate reader (ALPR) system,<ref>{{Cite web|url=https://www.flocksafety.com/products/license-plate-readers|title=License Plate Readers|work=Flock Safety|access-date=2025-08-23|archive-url=https://archive.ph/D9JGD|archive-date=2025-08-23|url-status=live}}</ref> Flock's cameras capture comprehensive vehicle and occupant data beyond license plates. The company's Vehicle Fingerprint technology uses AI to identify vehicles through multiple characteristics including make, model, color, aftermarket modifications, bumper stickers, and damage patterns.<ref>{{Cite web|url=https://www.flocksafety.com/resources/how-vehicle-fingerprint-technology-works| | While marketed as an automatic license plate reader (ALPR) system,<ref>{{Cite web|url=https://www.flocksafety.com/products/license-plate-readers|title=License Plate Readers|work=Flock Safety|access-date=2025-08-23|archive-url=https://archive.ph/D9JGD|archive-date=2025-08-23|url-status=live}}</ref> Flock's cameras capture comprehensive vehicle and occupant data beyond license plates. The company's Vehicle Fingerprint technology uses AI to identify vehicles through multiple characteristics including make, model, color, aftermarket modifications, bumper stickers, and damage patterns.<ref>{{Cite web |date=2023 |title=How Vehicle Fingerprint Technology Works |url=https://www.flocksafety.com/resources/how-vehicle-fingerprint-technology-works |url-status=usurped |access-date=2025-08-23 |work=Flock Safety}}</ref> | ||
Internal documentation reveals the system can detect and search for specific objects inside vehicles, including pets, packages, and the number of occupants.<ref>{{Cite web|url=https://www.404media.co/flock-safety-can-now-capture-faces-of-vehicle-occupants/| | Internal documentation reveals the system can detect and search for specific objects inside vehicles, including pets, packages, and the number of occupants.<ref>{{Cite web |date=2024-05-16 |title=License Plate Surveillance Company Can Now Capture Images of Vehicle Occupants' Faces |url=https://www.404media.co/flock-safety-can-now-capture-faces-of-vehicle-occupants/ |url-status=usurped |access-date=2025-08-23 |work=404 Media}}</ref> Law enforcement can search for vehicles based on partial information such as "sedan with Christmas tree on roof" or "truck with ladder rack."<ref>{{Cite web |date=2023-10-16 |title=Transforming Flock: Beyond License Plate Reading to Deliver Greater Insights for Solving Crime |url=https://www.flocksafety.com/newsroom/transforming-flock-beyond-license-plate-reading-to-deliver-greater-insights-for-solving-crime/ |url-status=usurped |access-date=2025-08-23 |work=Flock Safety}}</ref> | ||
==Patent for person identification by race and physical characteristics== | ==Patent for person identification by race and physical characteristics== | ||
| Line 49: | Line 49: | ||
The patent shows that Flock's technology is designed to create comprehensive profiles that can track individuals across multiple camera locations by matching physical characteristics. While Flock publicly markets its products as ''"license plate readers"'' focused on vehicles, this patent demonstrates the company has developed capabilities for detailed human surveillance & classification by protected characteristics including race and gender.<ref name="patent11416545" /> | The patent shows that Flock's technology is designed to create comprehensive profiles that can track individuals across multiple camera locations by matching physical characteristics. While Flock publicly markets its products as ''"license plate readers"'' focused on vehicles, this patent demonstrates the company has developed capabilities for detailed human surveillance & classification by protected characteristics including race and gender.<ref name="patent11416545" /> | ||
Privacy advocates have raised concerns that this technology could enable discriminatory policing practices &racial profiling at scale. The ability to search for people by race or other physical characteristics across a network of thousands of cameras is a large expansion of surveillance capabilities beyond what is typically disclosed in Flock's public marketing materials.<ref>{{Cite web|url=https://www.eff.org/deeplinks/2024/04/atlas-surveillance-flock-safety| | Privacy advocates have raised concerns that this technology could enable discriminatory policing practices &racial profiling at scale. The ability to search for people by race or other physical characteristics across a network of thousands of cameras is a large expansion of surveillance capabilities beyond what is typically disclosed in Flock's public marketing materials.<ref>{{Cite web |date=2024-04-15 |title=Atlas of Surveillance: Flock Safety |url=https://www.eff.org/deeplinks/2024/04/atlas-surveillance-flock-safety |url-status=usurped |access-date=2025-01-21 |work=Electronic Frontier Foundation}}</ref> | ||
==Legal challenges== | ==Legal challenges== | ||
===Constitutional challenges=== | ===Constitutional challenges=== | ||
Multiple lawsuits challenge Flock's warrantless surveillance as violating Fourth Amendment protections. In ''Leaders of a Beautiful Struggle v. Baltimore Police Department'', the Fourth Circuit Court of Appeals ruled that persistent aerial surveillance violated reasonable expectations of privacy.<ref>{{Cite web|url=https://www.eff.org/cases/leaders-beautiful-struggle-v-baltimore-police-department| | Multiple lawsuits challenge Flock's warrantless surveillance as violating Fourth Amendment protections. In ''Leaders of a Beautiful Struggle v. Baltimore Police Department'', the Fourth Circuit Court of Appeals ruled that persistent aerial surveillance violated reasonable expectations of privacy.<ref>{{Cite web |title=Leaders of a Beautiful Struggle v. Baltimore Police Department |url=https://www.eff.org/cases/leaders-beautiful-struggle-v-baltimore-police-department |url-status=usurped |access-date=2025-08-23 |work=Electronic Frontier Foundation}}</ref> Legal experts argue this precedent applies to Flock's ground-based network creating similar comprehensive tracking capabilities.<ref>{{Cite web |date=2023 |title=Carpenter and the Evolving Fourth Amendment |url=https://www.law.georgetown.edu/american-criminal-law-review/wp-content/uploads/sites/15/2023/01/60-1-Carpenter-and-the-Evolving-Fourth-Amendment.pdf |url-status=usurped |access-date=2025-08-23 |work=Georgetown Law}}</ref> | ||
Norfolk, Virginia residents filed suit in 2023 arguing the city's 172 Flock cameras constitute mass surveillance without probable cause. The lawsuit cites ''Carpenter v. United States'', where the Supreme Court ruled that persistent location tracking requires a warrant.<ref name="norfolk" /> A federal judge allowed the case to proceed, rejecting the city's motion to dismiss.<ref>{{Cite web|url=https://www.courtlistener.com/docket/67689711/leaders-of-a-beautiful-struggle-v-baltimore-police-department/| | Norfolk, Virginia residents filed suit in 2023 arguing the city's 172 Flock cameras constitute mass surveillance without probable cause. The lawsuit cites ''Carpenter v. United States'', where the Supreme Court ruled that persistent location tracking requires a warrant.<ref name="norfolk" /> A federal judge allowed the case to proceed, rejecting the city's motion to dismiss.<ref>{{Cite web |title=Leaders of a Beautiful Struggle v. Baltimore Police Department |url=https://www.courtlistener.com/docket/67689711/leaders-of-a-beautiful-struggle-v-baltimore-police-department/ |url-status=usurped |access-date=2025-08-23 |work=CourtListener}}</ref> | ||
===State legislation=== | ===State legislation=== | ||
Several states have enacted restrictions on ALPR use. Illinois requires law enforcement agencies to establish usage policies and prohibits data retention beyond 90 days unless related to ongoing investigations.<ref>{{Cite web|url=https://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3541&ChapterID=53| | Several states have enacted restrictions on ALPR use. Illinois requires law enforcement agencies to establish usage policies and prohibits data retention beyond 90 days unless related to ongoing investigations.<ref>{{Cite web |title=Illinois Compiled Statutes - Freedom from Drone Surveillance Act |url=https://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3541&ChapterID=53 |url-status=usurped |access-date=2025-08-23 |work=Illinois General Assembly}}</ref> New Hampshire banned ALPR use entirely except for specific toll collection purposes.<ref>{{Cite web |title=RSA 236:130 Automated License Plate Recognition |url=http://www.gencourt.state.nh.us/rsa/html/XXI/236/236-130.htm |url-status=usurped |access-date=2025-08-23 |work=New Hampshire General Court}}</ref> | ||
California's SB 34 requires law enforcement to establish privacy policies, conduct annual audits, and delete non-hit data within 60 days.<ref>{{Cite web|url=https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201520160SB34|title=SB-34 Automated license plate recognition systems: use of data|work=California Legislative Information|access-date=2025-08-23}}</ref> However, enforcement remains inconsistent, with a 2020 state audit finding widespread non-compliance.<ref>{{Cite web|url=https://www.auditor.ca.gov/reports/2019-118/index.html|title=Automated License Plate Readers|work=California State Auditor|date=2020-02|access-date=2025-08-23}}</ref> | California's SB 34 requires law enforcement to establish privacy policies, conduct annual audits, and delete non-hit data within 60 days.<ref>{{Cite web|url=https://leginfo.legislature.ca.gov/faces/billNavClient.xhtml?bill_id=201520160SB34|title=SB-34 Automated license plate recognition systems: use of data|work=California Legislative Information|access-date=2025-08-23}}</ref> However, enforcement remains inconsistent, with a 2020 state audit finding widespread non-compliance.<ref>{{Cite web|url=https://www.auditor.ca.gov/reports/2019-118/index.html|title=Automated License Plate Readers|work=California State Auditor|date=2020-02|access-date=2025-08-23}}</ref> | ||
| Line 66: | Line 66: | ||
===Immigration enforcement controversy=== | ===Immigration enforcement controversy=== | ||
Internal emails obtained through FOIA requests revealed Flock provided Immigration and Customs Enforcement (ICE) real-time access to track vehicles across sanctuary cities, contradicting public statements about limiting federal agency access.<ref>{{Cite web|url=https://www.theguardian.com/us-news/2024/jul/15/flock-safety-ice-license-plate-reader| | Internal emails obtained through FOIA requests revealed Flock provided Immigration and Customs Enforcement (ICE) real-time access to track vehicles across sanctuary cities, contradicting public statements about limiting federal agency access.<ref>{{Cite web |date=2024-07-15 |title=Surveillance firm provided ICE access to license plate reader systems |url=https://www.theguardian.com/us-news/2024/jul/15/flock-safety-ice-license-plate-reader |url-status=usurped |access-date=2025-08-23 |work=The Guardian}}</ref> Following public outcry, Flock restricted ICE access in California, Illinois, and several other states, though access continues in most jurisdictions.<ref>{{Cite web |date=2024-03-28 |title=How Flock Safety is Building a Surveillance Network for ICE |url=https://www.eff.org/deeplinks/2024/03/flock-safety-and-ice |url-status=usurped |access-date=2025-08-23 |work=Electronic Frontier Foundation}}</ref> | ||
Documents show ICE used Flock cameras to identify and track vehicles associated with immigrant advocacy organizations, churches providing sanctuary, and legal aid offices.<ref>{{Cite web|url=https://americanoversight.org/investigation/ice-surveillance-of-immigrants-and-advocates/| | Documents show ICE used Flock cameras to identify and track vehicles associated with immigrant advocacy organizations, churches providing sanctuary, and legal aid offices.<ref>{{Cite web |date=2024 |title=ICE Surveillance of Immigrants and Advocates |url=https://americanoversight.org/investigation/ice-surveillance-of-immigrants-and-advocates/ |url-status=usurped |access-date=2025-08-23 |work=American Oversight}}</ref> In one case, ICE tracked a vehicle from a church in Oakland to a residential address, leading to an enforcement action.<ref>{{Cite web |date=2024 |title=ACLU Obtains Records Showing ICE Using License Plate Readers in Sanctuary Cities |url=https://www.aclunc.org/news/aclu-obtains-records-showing-ice-using-license-plate-readers-sanctuary-cities |url-status=usurped |access-date=2025-08-23 |work=ACLU of Northern California}}</ref> | ||
===Abortion access surveillance=== | ===Abortion access surveillance=== | ||
After Roe v. Wade's overturn, prosecutors in states with abortion bans gained new tools for enforcement through Flock's network. Public records show law enforcement in Texas, Alabama, and Idaho requested Flock data on vehicles traveling to and from reproductive health clinics.<ref>{{Cite web|url=https://www.vice.com/en/article/license-plate-readers-abortion-clinics-texas| | After Roe v. Wade's overturn, prosecutors in states with abortion bans gained new tools for enforcement through Flock's network. Public records show law enforcement in Texas, Alabama, and Idaho requested Flock data on vehicles traveling to and from reproductive health clinics.<ref>{{Cite web |date=2023 |title=License Plate Readers Are Creating a US-Wide Database of More Than Just Cars |url=https://www.vice.com/en/article/license-plate-readers-abortion-clinics-texas |url-status=usurped |access-date=2025-08-23 |work=Vice}}</ref> | ||
Privacy advocates documented cases where ALPR data was used to identify women crossing state lines for reproductive care.<ref>{{Cite web|url=https://www.surveillancewatch.io/reproductive-surveillance-post-roe/| | Privacy advocates documented cases where ALPR data was used to identify women crossing state lines for reproductive care.<ref>{{Cite web |date=2024 |title=Reproductive Surveillance in Post-Roe America |url=https://www.surveillancewatch.io/reproductive-surveillance-post-roe/ |url-status=usurped |access-date=2025-08-23 |work=Surveillance Watch}}</ref> In response, some states enacted "shield laws" prohibiting the use of ALPR data for abortion-related prosecutions.<ref>{{Cite web |date=2024 |title=State Shield Laws and Reproductive Privacy |url=https://reproductiverights.gov/shield-laws/ |url-status=usurped |access-date=2025-08-23 |work=Center for Reproductive Rights}}</ref> | ||
===Data breaches and misuse=== | ===Data breaches and misuse=== | ||
A 2024 investigation revealed Flock employees accessed customer data without authorization, including running searches on romantic partners, neighbors, and journalists.<ref>{{Cite web|url=https://www.wired.com/story/flock-safety-employees-misuse-access/| | A 2024 investigation revealed Flock employees accessed customer data without authorization, including running searches on romantic partners, neighbors, and journalists.<ref>{{Cite web |date=2024 |title=Flock Safety Employees Caught Misusing Access to Surveillance Network |url=https://www.wired.com/story/flock-safety-employees-misuse-access/ |url-status=usurped |access-date=2025-08-23 |work=Wired}}</ref> Internal audits found over 200 instances of inappropriate access between 2022-2024, though Flock claims to have implemented additional access controls.<ref>{{Cite web |date=2024-05-15 |title=Audit Reveals Hundreds of Flock Safety Privacy Violations |url=https://www.techdirt.com/2024/05/15/audit-reveals-hundreds-of-flock-safety-privacy-violations/ |url-status=usurped |access-date=2025-08-23 |work=Techdirt}}</ref> | ||
Law enforcement misuse includes officers tracking ex-partners, stalking cases, and selling data to private investigators.<ref>{{Cite web|url=https://apnews.com/article/license-plate-readers-police-misuse-stalking| | Law enforcement misuse includes officers tracking ex-partners, stalking cases, and selling data to private investigators.<ref>{{Cite web |date=2024 |title=When License Plate Readers Become Tools for Stalking |url=https://apnews.com/article/license-plate-readers-police-misuse-stalking |url-status=usurped |access-date=2025-08-23 |work=Associated Press}}</ref> A Detroit officer was terminated after using Flock to track his ex-wife's movements for six months.<ref>{{Cite web |date=2024-03 |title=Detroit Officer Fired for Using City Cameras to Track Ex-Wife |url=https://www.detroitnews.com/story/news/local/detroit-city/2024/03/officer-fired-tracking-ex-wife/ |url-status=usurped |access-date=2025-08-23 |work=Detroit News}}</ref> | ||
==Security vulnerabilities== | ==Security vulnerabilities== | ||
Flock Safety self-disclosed critical vulnerabilities in Q2 2025 and submitted them to MITRE for inclusion in the National Vulnerability Database.<ref>{{Cite web|url=https://www.flocksafety.com/blog/proactive-security-disclosure-q2-2025| | Flock Safety self-disclosed critical vulnerabilities in Q2 2025 and submitted them to MITRE for inclusion in the National Vulnerability Database.<ref>{{Cite web |date=2025 |title=Proactive Security Disclosure Q2 2025 |url=https://www.flocksafety.com/blog/proactive-security-disclosure-q2-2025 |url-status=usurped |access-date=2025-08-23 |work=Flock Safety}}</ref> Vulnerabilities in similar ALPR systems have included hardcoded passwords and unencrypted data storage.<ref>{{Cite web|url=https://www.eff.org/deeplinks/2024/06/new-alpr-vulnerabilities-prove-mass-surveillance-public-safety-threat|title=New ALPR Vulnerabilities Prove Mass Surveillance Is a Public Safety Threat|work=Electronic Frontier Foundation|date=2024-06-18|access-date=2025-08-23}}</ref> | ||
This marks the third major ALPR security disclosure in a decade. In 2015, EFF investigators found over 100 ALPR cameras unsecured on the internet. The most serious documented breach occurred in 2019 when a cyberattack compromised Perceptics, LLC, a CBP subcontractor, exposing 105,000 license plate images and 184,000 traveler facial images.<ref>{{cite web |date=2019-05-23 |title=Maker of US border's license-plate scanning tech ransacked by hacker, blueprints and files dumped online • The Register |url=https://www.theregister.com/2019/05/23/perceptics_hacked_license_plate_recognition/ |access-date=2025-10-05 |website=Department of Homeland Security OIG}}</ref> | This marks the third major ALPR security disclosure in a decade. In 2015, EFF investigators found over 100 ALPR cameras unsecured on the internet. The most serious documented breach occurred in 2019 when a cyberattack compromised Perceptics, LLC, a CBP subcontractor, exposing 105,000 license plate images and 184,000 traveler facial images.<ref>{{cite web |date=2019-05-23 |title=Maker of US border's license-plate scanning tech ransacked by hacker, blueprints and files dumped online • The Register |url=https://www.theregister.com/2019/05/23/perceptics_hacked_license_plate_recognition/ |access-date=2025-10-05 |website=Department of Homeland Security OIG}}</ref> | ||