<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Footnote4a</title>
        <link>https://footnote4a.org/</link>
        <description>Editorial reporting from Footnote4a</description>
        <lastBuildDate>Sat, 18 Apr 2026 18:30:00 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <copyright>© 2026 Footnote4a</copyright>
        <atom:link href="https://footnote4a.org/feed.xml" rel="self" type="application/rss+xml"/>
        <item>
            <title><![CDATA[The Cost of Being Alive: Flock CEO Langley at TED2026]]></title>
            <link>https://footnote4a.org/news/langley-ted2026</link>
            <guid isPermaLink="false">https://footnote4a.org/news/langley-ted2026</guid>
            <pubDate>Sat, 18 Apr 2026 18:30:00 GMT</pubDate>
            <description><![CDATA[Flock's CEO told a $12,500-a-seat TED audience that in South Africa, "crime is simply the cost of being alive." His own company is helping keep it that way.]]></description>
            <content:encoded><![CDATA[<p>Flock’s CEO spoke at “TED2026: All of Us” (<a href="https://archive.vn/Dxn7l">Police1 transcript (archive)</a>). Attendees with a
$12,500 “Standard” membership (or higher) had applied to hear Langley speak about equity in police
surveillance. Instead, he made the case against his own company in three distinct ways.</p>
<h2>“Every city has a right”</h2>
<blockquote>
<p>America is built on principles of freedom, and every city has a right to make that choice. When a
community pulls back on public safety they achieve less surveillance, but the people who are made
to suffer aren’t the affluent ones, it’s the people who live in neighborhoods where they can’t
afford safety…</p>
</blockquote>
<p>“[E]very city has a right to make that choice” is Langley flat-out catering to his customer base.
The U.S. Constitution — specifically the Fourth Amendment — as well as many state constitutions are
intended to constrain government. Local governments don’t have unlimited power.</p>
<p>The other issue here is that “the people who live in neighborhoods” are left out of the conversation
and the decision to deploy surveillance entirely. They suddenly discover “LPR” cameras pointed at
their basketball court because Flock’s own sales pitch — second image below — says these deployments
are a way for departments to get video surveillance without having to go through a public hearing.</p>
<div class="grid grid-cols-2 items-center gap-x-2">
  <img src="https://footnote4a.org/blog/speed-cameras/park-lpr.jpeg"
       alt="Set of Flock LPR cameras facing basketball and pickleball courts">
  <img src="https://footnote4a.org/blog/speed-cameras/wing-live.webp" alt="Live video without approval">
</div>
<p>“Flock LPR” cameras are named to trick people into believing they’re license plate readers. Instead,
they capture video and data to be fed into a sprawling national system centered on Flock’s “Nova”
intelligence product.</p>
<p>In Langley’s world, the cops get to choose. The people aren’t even told.</p>
<h2>Safety-as-a-Service (for a Recurring Fee)</h2>
<blockquote>
<p>South Africa has over 600,000 private security guards. More than its police and military combined.
The wealthy live behind nine-foot walls and electric fences. Safety exists, if you can afford it.
If you can’t, crime is simply the cost of being alive.</p>
</blockquote>
<p>The true hypocrisy, however, is not the price tag for “All of Us”, but the invocation of South
Africa’s “pay to stay safe” system. Langley cites it as an example of inequality; at the same time,
<a href="vumacam-flock">Flock partners with the South African company Vumacam</a> to profit off the creation of
a new era of “<a href="https://www.technologyreview.com/2022/04/19/1049996/south-africa-ai-surveillance-digital-apartheid/">digital apartheid</a>” in South Africa.</p>
<div class="not-prose">
    <img src="https://footnote4a.org/blog/vumacam-flock/partner-linkedin-image.png"
        alt="Partner Event image with Flock and Vumacam"
        class="mx-auto w-[500px]">
    <div class="text-sm text-center w-full italic">
    Via Ricky Croock's LinkedIn (spelled as "Ricky Crook" here).
    </div>
</div>
<p>Vumacam places Flock cameras in affluent suburbs and sells that data to private security
contractors. Those corporations, which are even less accountable than the government, in turn sell
their services to South Africa’s upper-class.</p>
<p>Langley stands on-stage in feigned indignation, as his <a href="https://techstartups.com/2026/04/17/flock-safety-hits-8-4b-valuation-as-ai-powered-police-tech-sparks-nationwide-protests/">$8.4 billion company</a> collects on “the
cost of being alive.”</p>
<h2>The Digital Standing Army</h2>
<p>Langley lauds police forces in other countries and considers the U.S. system of local police to be a
“unique problem we have created for ourselves”. He is wrong. It’s not a problem, but a solution.</p>
<p>The founding generation was deeply divided on standing armies. At the time, the local militia kept
the peace — professional police didn’t arrive in the U.S. until 1838. A common wisdom was that the
more local the militia, the less likely it would be to turn on the people.</p>
<p>What the founders feared from a standing army has arrived in a different form: increasingly
militarized and high-tech police. Langley describes his vision as one where any police officer
anywhere in the country can “share” and “cooperate” across borders and jurisdictions.</p>
<p>What that means in practice is that any police department in the nation has the capability to
dispatch one of Langley’s drones based on reports from his national “Nova” system, fed by hundreds
of thousands of his cameras.</p>
<p>Even Hamilton, a proponent of standing armies, <a href="https://founders.archives.gov/documents/Hamilton/01-04-02-0160">warned</a> that nations attached to liberty will,
in time, give up freedom for safety — a dynamic that scales down to any institution sold as
protection.</p>
<p>Police now believe they depend on Flock. That means its CEO can not only afford safety — he can
demand it from the standing army he helped create.</p>
<h2>What to do about it</h2>
<p>The camera on your corner was approved by someone. Find out who, and when they’re up for election.</p>
<ul>
<li><a href="https://footnote4a.org/pd">Check whether your city uses Flock</a>.</li>
<li>Request public records for contracts, data-sharing and demo agreements, and <a href="https://footnote4a.org/about/audit-logs">log
files</a>.</li>
</ul>
<p>Public hearings and records requests are the only reason any of this is visible at all. Keep
showing up.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock Dodges Dunwoody Question with Demo Defense]]></title>
            <link>https://footnote4a.org/news/dunwoody-demo</link>
            <guid isPermaLink="false">https://footnote4a.org/news/dunwoody-demo</guid>
            <pubDate>Fri, 17 Apr 2026 21:20:00 GMT</pubDate>
            <description><![CDATA[Flock responds to allegations that its executives accessed cameras inside a community center gymnastics room — three months late, via blog post, and with a novel theory of what 'crime-solving' means.]]></description>
            <content:encoded><![CDATA[<p>Following <a href="https://jasonhunyar.substack.com/p/why-are-flock-employees-watching-720">allegations that Flock employees had accessed cameras inside a private Jewish community
center, including its gymnastics room</a>, Flock and local government officials responded
predictably: they conferred behind closed doors, handwaved away the allegation in public, and
proceeded to give each other whatever benefits they negotiated.</p>
<p>Three days after the deal closed, Flock, apparently alive to the optics of its employees viewing a
community center pool through police cameras, released a blog post titled “<a href="https://archive.vn/WiDDV">Understanding Flock’s
Testing and Development Program</a>.” Personally, I would not have chosen to link “employees
viewing a gymnastics room” to “testing and development.” But this is Flock.</p>
<p>The issue Flock’s blog post addresses was raised by Dunwoody resident Jason Hunyar and amplified by
YouTuber Benn Jordan: Dunwoody PD’s event logs (similar to, but not the same as, the “ALPR audit
logs” this site publishes) showed Flock executives had opened camera streams inside the <abbr class="md-tooltip" data-tooltip="Jewish Community Center">JCC</abbr> on
numerous occasions, for durations the logs don’t record. For the details, see <a href="https://jasonhunyar.substack.com/p/why-are-flock-employees-watching-720">Jason’s write-up</a>
and the posts about the <a href="dunwoody-2026-04-13">April 13 Dunwoody meeting</a> and <a href="dunwoody-deal">its
outcome</a>.</p>
<p>The post was published under Josh Thomas’ name—the company’s Chief Communications Officer who has
been speaking for Flock for the past eight years. It’s not a slapdash production by an engineering
manager. His headline reads:</p>
<blockquote>
<p>This article explains how Flock tests its technology in real-world environments, strengthens
search safeguards, and addresses recent privacy questions about its development practices.</p>
</blockquote>
<p>Let’s discuss these topics. And the buried lede.</p>
<h2>The Lede Thomas Buried</h2>
<p>Tucked into the middle of the post, presented as evidence of a safeguard working, is this:</p>
<blockquote>
<p>In Dunwoody, a Flock employee performed a demo of this content moderation policy by searching for
both “Star of David”, which our search moderation tool blocked, and “Cowboy hat,” which the search
moderation tool allowed.</p>
</blockquote>
<p>Flock describes the underlying feature, FreeForm, as a search tool that allows officers to query
cameras for descriptive phrases like “man wearing a cowboy hat.” Read that together with the
Dunwoody example: a Flock sales employee ran an identifying search against live Dunwoody camera
data. The cowboy hat search, per Flock’s own description, returned results—real people, in Dunwoody,
identified by what they were wearing, surfaced to a salesperson running a demo. The Star of David
search was also made.</p>
<p>The only thing that stopped it from returning a list of Jewish residents of Dunwoody was a content
filter Flock built, maintains, and can modify at any time without telling anyone.</p>
<p>Flock presents this as reassuring. It is the opposite.</p>
<p>The architecture underneath the filter is the actual story. Flock’s patent, <a href="https://patents.google.com/patent/US11416545B1">US 11,416,545</a>,
titled “System and method for object based query of video content captured by a dynamic surveillance
network,” describes parsing video “for content” and storing it “in a database in connection with
data that identifies the content (object class, aspects of the object, confidence scores, time and
location data, etc.).”</p>
<p>The patent family extends to neural networks trained to identify clothing, estimate height and
weight, and classify other physical characteristics of individuals—stored, by design, in searchable
databases. That is an index. It is being built continuously, by design, and is queryable by any user
Flock decides gets a search box.</p>
<p>The filters, which are themselves AI-based pattern matching rather than deterministic blocks, block
certain query strings against that index. They do not prevent the indexing. The filter can be
modified or turned off. <a href="freeform-freeforall">If it even works at all</a>.</p>
<p>Flock is asking for credit because its AI blocks certain searches. The thing worth noticing is what
those searches are being run against, and who is running them.</p>
<h2>Recent Privacy Questions About Development Practices</h2>
<p>Now the post’s stated topic. In <a href="https://jasonhunyar.substack.com/p/why-are-flock-employees-watching-720">his post</a>, Jason makes a number of factual allegations, all
sourced directly from Flock event logs, before concluding:</p>
<blockquote>
<p>On September 30th, 2025 - Bob [Carter, VP Business Development, Flock Safety] looked at just one
camera. This camera is in the gymnastics room of the <abbr class="md-tooltip" data-tooltip="Jewish Community Center">JCC</abbr>. I personally am curious about why a
sales employee from Flock would be viewing the gymnastics room. I think this also deserves an
explanation.</p>
<p>…</p>
<p>The public deserves to know why Flock employees are using Dunwoody’s Flock system to look at live
videos of people and children in the pool, gymnastic facilities, and fitness studios.</p>
</blockquote>
<p>Note what Jason actually asks for: an <em>explanation</em>. Not a prosecution, not a verdict, not a
character judgment. An explanation of why sales employees at a surveillance vendor are logged into a
police department’s system looking at cameras inside a community center. That question has been
outstanding since January, when Jason first brought it to the city council.</p>
<p>In its March meeting, long after Jason first contacted the city, Dunwoody IT <a href="the-platform">presented the results
of their security audit</a>. Dunwoody looked at the same logs and found no
issues.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> They didn’t answer Jason’s question. A month later, the mayor didn’t mention that
city staff had already gone over these logs. She didn’t answer Jason’s question.</p>
<p>Now, three months after the question was asked, the answer is delivered via blog post: the employees
named online are well-intentioned people who accessed a camera network with the city’s explicit
permission, as part of their job, and are now being called predators for it.</p>
<p>Josh Thomas asks us to accept that it is part of his company’s sales executives’ jobs to give sales
demos when kids are piled into the pool on a Wednesday afternoon, or when the gymnastics room is in
active use on a Tuesday at lunch.</p>
<p>Here is the core of what <em>is</em> verifiable: a Flock executive, who does not work for the police,
logged into a police account and opened a camera stream inside the gymnastics room at a community
center.</p>
<p>The event logs published by Jason—which Flock does not dispute—show multiple accesses by at least
two Flock employees, Bob Carter and Randy Gluck, to cameras inside the <abbr class="md-tooltip" data-tooltip="Jewish Community Center">JCC</abbr> across multiple dates in
2025, including cameras pointed at the gymnastics room, pools, and children’s facilities.</p>
<p>But the event logs show when a user starts viewing a stream. They don’t show when a user stops, or
any detail to provide critical context. Maybe Flock’s employees now better understand how inadequate
logging can facilitate abuse.</p>
<p>We can’t tell if looking up a license plate over and over in the middle of the night with only the
stated reason of “investigation” is stalking. We also can’t tell if the “pool” camera was viewed for
30 seconds from a terminal inside a police station, or if it was left running for hours or days on a
bedroom TV in another state.</p>
<p>Flock’s employees are seeing the end-result of multiple layers of failed policy, inadequate
transparency, insufficient auditing, and no accountability. Employees at a private company should
not have unescorted access to police surveillance data. If they had not had access, we would not be
having this conversation. It’s that simple.</p>
<p>The principle of <a href="https://en.wikipedia.org/wiki/Principle_of_least_privilege">least privilege</a> is not optional; it’s AC-6 under <a href="https://le.fbi.gov/file-repository/cjis_security_policy_v6-0_20241227.pdf">CJIS Security Policy
v6.0</a>; access should be limited to what’s “necessary to accomplish assigned organizational
tasks.”<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> Vendor and contractor access falls under PS-7 (External Personnel Security).
Account management is AC-2. And the audit controls that would normally catch any of this are in AU-2
and AU-3, and AU-9. Nearly-identical controls exist under SOC 2 and ISO 27001. Both certifications
Flock touts.</p>
<p>Months after the issue was first raised, Flock now claims the activity was approved under “the
city’s demo partner agreement.” Flock did not provide its terms. Dunwoody never produced it in
<a href="https://footnote4a.org/blog/dunwoody-demo/request.png">response to Jason’s open records requests</a>. Flock employees at the
March and April meetings didn’t mention it. The police chief and IT director stayed silent on it
during the audit presentation at the March meeting. The mayor didn’t mention it when she addressed
the issue at the April council meeting.</p>
<p>Dunwoody has now signed the deal. The incentive to stay on-message is gone, and Flock has moved
directly to publicly accusing its “partner” of hiding an agreement as a <em>post-hoc</em> justification of
its violation of public trust.</p>
<h2>On Being Accused of Accusing People</h2>
<p>Flock’s post includes this line, which is the most carefully lawyered sentence in it:</p>
<blockquote>
<p>Accusing someone of spying on children is not a policy disagreement; it is a life-altering
allegation.</p>
</blockquote>
<p>Correct. Fortunately, no one in this story has made that accusation. Jason asked for an
<em>explanation</em>—in writing, to the Dunwoody city council, on January 12, and every month since. What
Flock has now done, three months later, is respond to an accusation Jason did not make.</p>
<p>Flock employees had the technical capability to watch children at a community center and accessed
cameras pointed at those children. Whether any individual Flock employee <em>used</em> that capability
maliciously is unknown and largely beside the point. The capability is the problem. The access is
the problem. The absence of any meaningful oversight is the problem.</p>
<p>Josh Thomas would like the story to be about what is in a sales executive’s heart, because that is a
story he can win. The story he can’t win is the one about Flock’s architecture.</p>
<h2>What the Logs Actually Show</h2>
<p>Flock’s post frames the Dunwoody events as a single routine demo at an unusually sensitive location.
The event logs <a href="https://jasonhunyar.substack.com/p/why-are-flock-employees-watching-720">Jason obtained by open records request</a> show 185 <abbr class="md-tooltip" data-tooltip="Jewish Community Center">JCC</abbr>-camera accesses by Flock VP
Bob Carter alone since January 2025.</p>
<p>The network sharing is even worse. The <abbr class="md-tooltip" data-tooltip="Jewish Community Center">JCC</abbr>’s private camera network, labeled in Flock’s system
“Dunwoody GA PD - Atlanta <abbr class="md-tooltip" data-tooltip="Jewish Community Center">JCC</abbr> Avigilon (Do Not Share),” was at one point actively shared by Dunwoody
PD with three outside agencies, including Lawrenceville GA PD, which received permissions to view,
record, and download live video streams.</p>
<p>That sharing was removed only after Jason disclosed it to Dunwoody’s chief, and the removal was
performed by a user (“John Watson”) not in the user export—which should include historical users. A
ghost administrator corrected a misconfiguration that was not supposed to exist in the first place.</p>
<p>At the March council meeting, Dunwoody’s own lieutenant told the public that only two neighboring
agencies view live streams and that liveview access is “strictly reviewed and on a case by case
basis.” The logs show 1,271 agencies with access. The logs show no access by any agency, including
the two confirmed active users.</p>
<p>This is the environment in which Flock employees, in Josh Thomas’s description, are
“well-intentioned” and “accessed a camera network with the city’s explicit permission.”</p>
<p>They may be. There is no way to know.</p>
<h2>Strengthened Search Safeguards</h2>
<p>This takes up the most space in Flock’s post; we can keep it short here. Flock describes its
<em>existing</em> <a href="freeform-freeforall">broken AI-based “FreeForm” moderation system</a>, which did exactly
nothing to prevent anything that happened here.</p>
<h2>Testing Technology in Real World Environments</h2>
<p>Mentioned in the same breath as “development practices.” Flock does not distinguish between
“development,” “testing,” and “production”—in its post or in practice. It’s not an uncommon problem
for venture-backed software companies, but it’s not a small one for Flock. I have written about this
<a href="trust-center">many times before</a>, and Flock continues to signal it will do nothing to address it.</p>
<p>Flock’s approach is to let its developers and sales execs loose on a real police department’s
account, connected to real cameras, pointed at real people—and, yes, real children.</p>
<p>The Cybertruck example Flock offers is this:</p>
<blockquote>
<p>Here’s a concrete example: when the Tesla Cybertruck came out, we had to build a whole new ML
algorithm to identify it. Nothing had been seen like that before. This requires testing and
training the models in real-world conditions.</p>
</blockquote>
<p>“A whole new ML algorithm” is an overstatement. Flock was failing to detect the Cybertruck as a car
(or truck, or whatever it is). That’s a training task, not a new algorithm, and an entire industry
exists to support exactly that kind of image-recognition training.</p>
<p>Even if Flock does all its ML work in-house, whether <a href="overseas-data">overseas</a> or not, and uses only
data collected under its government contracts, all it requires is an image and someone to answer:
“<a href="https://www.youtube.com/watch?v=ACmydtFDTGs">Cybertruck or not Cybertruck?</a>”</p>
<p>Nobody at Flock needs access to a police account. Not for software development. Not for sales demos.</p>
<h2>The Remediation</h2>
<p>Flock describes its fix this way:</p>
<blockquote>
<p>Although the camera was only viewed once during a routine demo, we understand that this is a
sensitive location for many. We have therefore determined that employees will be trained to only
conduct demos in more public locations, like retail parking lots.</p>
</blockquote>
<p>So the reform is: Flock sales employees will continue to log into police surveillance systems, run
demos against live resident data, and view live camera feeds. They will just point the cameras at
people and children in more public places.</p>
<p>There is no commitment to stop using production police accounts for sales demos. No commitment to
separate development, test, and production environments. No commitment to publish the demo partner
agreements. No commitment to audit, retroactively, every access a Flock employee has made to
Dunwoody’s cameras. No changes to the logs themselves. Nothing structural.</p>
<p>Jason’s records work also documented Flock employees using Dunwoody’s system to create API
connections to third parties with whom Dunwoody has no contract; data funneled through those
integrations falls outside any contractual framework. This will not be addressed.</p>
<p>Flock’s repetition that “local agencies—not Flock—control who can access their data” falls especially
flat when it’s delivered in the same post where Flock argues that it needs access to that data
because it “must be tested and demoed, both to ensure we get everything right on the technical side
and so other agencies and businesses understand how the sharing works.”</p>
<p>If Dunwoody PD authorized Flock to share these video streams with “other agencies and businesses”
then that is perhaps even more problematic than broken vendor policies and architectures. It’s a
police agency acting entirely outside of the scope of its lawful duties to the detriment of the
local community.</p>
<p>If true—if the Dunwoody chief of police allowed video from within the community center to be shared
with “other agencies and businesses” without being authorized to do so by the council—he deserves to
be held accountable.</p>
<p>The signature on the demo agreement will tell.</p>
<h2>Addendum to My Previous Post</h2>
<p>In my previous post I wrote:</p>
<blockquote>
<p>The city’s new <abbr class="md-tooltip" data-tooltip="Master Services Agreement">MSA</abbr> does not prohibit Flock from accessing Dunwoody’s account, and continues to
grant Flock a royalty-free license to “support and improve Flock’s products and services,” which
arguably describes what happened here. The license has no specified term and cannot be revoked.</p>
</blockquote>
<p>That remains true, but it understated Flock’s asserted basis for access. I had assumed Flock would
rely on its license for business purposes. Instead, per the blog post:</p>
<blockquote>
<p>Similarly, one of the benefits communities most value about Flock technology is the ability for
law enforcement to directly access privately owned cameras, if and only if the organization allows
them to, for crime-solving and security purposes. This is also a feature that must be tested and
demoed, both to ensure we get everything right on the technical side and so other agencies and
businesses understand how the sharing works.</p>
</blockquote>
<p>In a deeply Nixonian “when I do it it’s not illegal” move, Flock treats “demos” for “other agencies
and businesses” as part of the government agency’s “crime-solving and security purposes.”</p>
<p>That’s Flock’s real-world interpretation of “the customer owns 100% of the data” and “Flock does not
access the data.”</p>
<h2>What You Can Do</h2>
<p>Flock has now publicly asserted that side agreements authorizing vendor access to police
surveillance systems are standard practice. If that is true, such agreements may exist in your city.</p>
<p>They are almost certainly not posted on any public agenda. They were not, in Dunwoody, produced in
response to ordinary records requests until Flock itself acknowledged them.</p>
<p>Consider filing a public-records request with your city or police department for any agreement or
other record showing whether your agency has entered into a demo or testing arrangement with Flock.</p>
<p>If you obtain any such agreements, or if your agency confirms none exist, I’d love it if you
<a href="mailto:hcvp@haveibeenflocked.com">let me know</a>.</p>
<p>Parents across the country have a right to know whether Flock employees are watching cameras in
their local daycares, community centers, and schools—whether the reason is software development,
testing, sales demos, or something else.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Well, they did—but they handwaved them away. Discussed in <a href="the-platform">that post</a>. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>CJIS v6.0 adopts the NIST SP 800-53 Rev. 5 control designations; AC-6, AC-2, PS-7, and the
AU-family audit controls are the control identifiers used throughout the policy. The full
policy, released December 27, 2024, is a 600-page document organized into 20 policy areas with
over 1,300 subcontrols. P1 controls (including AC-2, AC-6, and the core AU controls) are
immediately auditable; full compliance with all priority levels is required by October 1, 2027. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>contract-procurement</category>
        </item>
        <item>
            <title><![CDATA[The Dunwoody Drone Deal]]></title>
            <link>https://footnote4a.org/news/dunwoody-deal</link>
            <guid isPermaLink="false">https://footnote4a.org/news/dunwoody-deal</guid>
            <pubDate>Tue, 14 Apr 2026 13:00:00 GMT</pubDate>
            <description><![CDATA[Dunwoody tried to negotiate a Flock contract. The MSA won narrow concessions on data governance but left every structural problem intact. The drone program is ungoverned, Flock's liability in year two is $0, and sensitive law enforcement data is flowing to a third party under terms the MSA doesn't reach.]]></description>
            <content:encoded><![CDATA[<p>At the <a href="dunwoody-2026-04-13">April 13 City Council meeting</a>
(<a href="https://www.youtube.com/watch?v=AqOYDNKBr3g">Video</a>,
<a href="dunwoody-2026-04-13-transcript">Transcript</a>), Dunwoody unanimously voted to execute a Master
Services Agreement (MSA) with Flock and a $200,000 prepaid drone order form. Because Flock requires
the entire sum at signing, and because the MSA caps Flock’s liability at the amount paid in the
preceding twelve months, Flock’s contractual liability for the drone program drops to $0 in year
two.</p>
<p>The city also entered into a contract for FlockOS 911 that will see call data transferred to
Invictus, under an order form that incorporates Flock’s standard website terms and a separate set of
Prepared911 terms rather than the MSA the city just negotiated. The city’s existing Flock-provided
contract with ForceMetrics for sensitive, federally-regulated criminal justice information and
health data did not get a mention at all in either the meeting or the new MSA.</p>
<p>The most controversial aspect of the relationship, that Flock employees on Dunwoody’s account had
been caught watching the pool and gymnastics room at the community center, was vaguely explained and
addressed only through platitudes before being hand-waved away.</p>
<p>If your city has Flock cameras, the contract almost certainly contains the same structural problems
described below. Flock’s standard terms give it effective ownership of your data, cap its liability
at near-zero, and leave critical regulatory obligations undefined. Dunwoody tried to negotiate and
still ended up here.</p>
<h2>Sales Demos and Empty Promises</h2>
<p>The explanation was that Flock had been using the cameras in the gymnastics center for its sales
demos. It wasn’t a case of Flock executives watching children, the mayor assured the crowd. It was
Flock executives showing children to some unnamed third party to sell its product. This, in the
council’s view, made the situation better somehow.</p>
<p>The city’s new MSA does not prohibit Flock from accessing Dunwoody’s account, and continues to grant
Flock a royalty-free license to “support and improve Flock’s products and services,” which arguably
describes what happened here. The license has no specified term and cannot be revoked.</p>
<p>The city will also continue to pay<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> to send video surveillance footage from inside the
privately-owned and -operated rec center and daycare to Flock.</p>
<p>But, rather than write safeguards into the agreement up for a vote, residents were told Flock had
promised not to do it again. In the future, Flock promises, it will not expose images of Dunwoody
children practicing gymnastics or going for a swim as marketing materials for its sales prospects.</p>
<p>The council accepted the explanation and the promise at face-value and without further inquiry.</p>
<h2>What Dunwoody Didn’t Win</h2>
<p>A day before the meeting, councilmember Joe Seconder had told Jason Hunyar, the soon-to-be Dunwoody
Dad who discovered Flock’s viewing of the rec center, that the MSA would be raised “as a discussion
item, not a vote.” This would be so “there will be additional time to provide feedback on the MSA
… and what kind of revisions we can have set forth before a vote is held by council.”</p>
<p>Councilmember Seconder voted to adopt the MSA at that same meeting.</p>
<p>@<a href="https://footnote4a.org/blog/dunwoody-2026-04-13/Flock_Master_Services_Agreement.pdf" class="collapsible">Master Service Agreement</a></p>
<p>It prohibits Flock from using Customer Data “to train, fine-tune, or improve any machine learning,
artificial intelligence, or algorithmic models” without written authorization from the City Manager.
An email suffices.</p>
<p>It contractually mandates existing Flock features for data governance: a Federal Sharing Toggle that
lets the city disable all data sharing with federal agencies (as defined by Flock), and a toggle to
require case numbers and search justification for every query. Neither feature has to be enabled, but
both must exist.</p>
<p>It contractually includes Flock’s “audit log masking”, where Flock no longer exposes the complete
audit trail to its customers, framing it as a measure “to protect active investigations,
law-enforcement operations, and sensitive data.”</p>
<p>It also requires a post-login CJIS acknowledgment requirement. Never mind that the aforementioned
audit logs are a required component of CJIS compliance.</p>
<p>It freezes Flock’s incorporated Online Terms as of the Effective Date and bars unilateral changes
without a written amendment signed by the Mayor or City Manager — but stops short at requiring
council approval to modify the agreement approved by council.</p>
<p>These are concessions that sound good but collapse under even minimal scrutiny. They do not address
the structural problems that make the rest of the contract a liability.</p>
<h2>What Dunwoody Lost</h2>
<p>The standard terms that place effective data ownership with Flock are left unmodified:</p>
<blockquote>
<p>Flock retains the exclusive right to determine and control the method, timing, format, and medium
of access or delivery of Customer Data … and is not obligated to provide Customer Data in any
alternative form, format or transmission method outside of the Web Interface.</p>
</blockquote>
<p>It’s not your data if you can’t access it and Flock doesn’t have to hand it over. It’s also not
definitionally your data:</p>
<blockquote>
<p>For clarity, Flock Property also includes any derivative works, intermediate or final outputs,
analyses, reports, models, or other results generated by or through the Flock Services. Except for
the limited ability to access and download Customer Data within the applicable Retention Period,
no rights are granted to download, extract, export, or otherwise create or retain copies of such
derivative works, outputs, or other elements of Flock Property.</p>
</blockquote>
<p>A license plate number, a vehicle description, and arguably the raw image that Dunwoody won’t be
able to access are a “derivative work,” “output,” or “result” “generated by or through the Flock
Services.” “No rights are granted” to Dunwoody to any of this data.</p>
<p>Until the city manager sends an email, the AI/ML restriction limits what Flock can do with Customer
Data for model training. It does nothing about data Flock classifies as Flock Property.</p>
<h2>The Battle of the Order Forms</h2>
<p>The city’s outside counsel assured the city council that the MSA with Flock would govern the city’s
agreement with Invictus. She did not explain how the MSA, between Flock and Dunwoody, applies to an
agreement with a separate company. She addressed the incorporation of Flock’s online terms by
conclusorily asserting that the MSA would control; a possibility, not a given.</p>
<p>The FlockOS 911 order form does not incorporate the MSA. It incorporates the terms and conditions on
Flock’s website and the Prepared911 Terms and Conditions at a separate URL. The council’s motion
conditioned approval on execution of the MSA, but a condition precedent to signing is not the same
as incorporating the MSA’s terms into the document being signed. The order form still says what it
says. The council unanimously voted to sign the form that incorporates those terms rather than cross
out the references and explicitly incorporate the MSA.</p>
<p>If Flock were to make the argument that the MSA does not govern the FlockOS 911 contract, it would
have a strong position; the council agreed to the terms after adopting the MSA, and the MSA’s
governance does not definitively follow from its structure:</p>
<p>The MSA defines “Agreement” to be the MSA <strong>plus</strong> any Order Forms. Its conflict-resolution clause
handles conflicts between the “Agreement” (which includes the Order Form) and (1) any statement of
work or purchase order, (2) special terms listed on an order form, (3) incorporated online terms.
Conflicts between the “Agreement” and any “Order Form” (which is a part of the “Agreement”) are left
unaddressed, because they are definitionally the same document.</p>
<h3>$0 Liability</h3>
<p>It’s a circular structure that’s especially damaging in the case of the Drone-as-First-Responder
(DFR) contract:</p>
<ol>
<li>Dunwoody signed a DFR agreement at some unspecified earlier date.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></li>
<li>The MSA is executed. It “supersedes all prior agreements, understandings, and representations
relating to the Flock Services.” The original DFR agreement is now dead.</li>
<li>The new DFR Order Form, approved during the April meeting, is executed “on the date hereof or
following the Effective Date,” so it’s automatically part of the “Agreement.”</li>
</ol>
<p>But the new Order Form incorporates “the previously executed agreement,” the document the MSA just
killed in Step 2. It’s trying to resurrect terms that the Entire Agreement clause superseded. The
conflict clause can’t resolve this. Not because it wasn’t designed for necromancy but because the
new Order Form can’t conflict with the Agreement because it <em>is</em> the Agreement. There’s no hierarchy
for resolving an internal contradiction within the Agreement itself.</p>
<p>The city is prepaying $200,000 for “Flock Hardware” it does not own and cannot maintain, per the
MSA,<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup> but that’s not even the worst part: the MSA caps Flock’s aggregate liability at the
total amount paid in the twelve months before a claim arises. Because the entire $200,000 is due at
signing, in year two the amount paid in the preceding twelve months will be $0. Flock will carry no
financial liability at all for operating an aircraft under contract with Dunwoody.</p>
<p>Drones, like any aircraft, are heavily regulated by the FAA. <a href="https://www.faa.gov/uas/resources/policy_library">Those regulations</a>
are complex and violations can lead to severe penalties. Unsafe drone operations endanger other
aircraft and persons on the ground. It wouldn’t be the first time a police drone collided with
another aircraft.<sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup></p>
<h4>Pricing</h4>
<p>The pricing on the drone contracts is opaque. The first DFR Order Form lists a $300,000 contract
total: $100,000 due in July 2025 and $200,000 recurring in January 2026, with a $160,699.50
discount on “Flock Safety Drone Hardware and Services”:</p>
<p><img src="https://footnote4a.org/blog/dunwoody-deal/discount1.png" alt="First Dunwoody DFR Contract" width="500"></p>
<p>The second shows $200,000 due at signing with no discounts at all:</p>
<p><img src="https://footnote4a.org/blog/dunwoody-deal/discount2.png" alt="Second Dunwoody DFR Contract" width="500"></p>
<p>The first order is for “Flock Safety DFR 2.0 - 400ft”. The second for “Flock DFR - M4TD + Dock 3 (2
System Set)” and “Flock911 for Aerodome”. All items are priced as “included” under a platform fee
that conceals the cost of each component.</p>
<p>Chief Carlson’s memo describes the second agreement as “the installation of additional DFR (Drone as
First Responder) coverage,” which, I’m told, means Flock will add an additional drone.</p>
<h4>Agreements All the Way Down</h4>
<p>The original DFR agreement, the “previously executed agreement” on the order form, is an 11-page
contract with a Product Addendum for “Unmanned Air Support as a Service,” two schedules covering
training and specifications, and terms that place virtually all operational liability on the city.</p>
<p>@<a href="https://footnote4a.org/blog/dunwoody-deal/FLOCK_4.pdf" class="collapsible">The original Dunwoody-Flock Drone Agreement</a></p>
<p>That agreement itself incorporates <em>another</em> “previously executed agreement” on <em>its</em> order form.
That appears to be a “Government Customer Service Agreement” from 2021, which is specific to ALPR.</p>
<p>The original drone agreement makes Dunwoody responsible for ensuring that all crew, including pilots,
visual observers, and sensor operators, hold the qualifications and certificates required by
applicable FAA regulations. It also assigns the city “the entire risk of loss, damage to, theft or
destruction of, all Flock Hardware” and states, in all capitals, that loss or damage “SHALL NOT
RELIEVE CUSTOMER OF ANY OBLIGATION UNDER THE AGREEMENT.”</p>
<p>The agreement carves all drone data, including flight logs, telemetry, radar, and fleet information,
out of Customer Data entirely. It classifies it as “Flock Drone IP” owned exclusively by Flock. The
city cannot share any of it with third parties without Flock’s written consent. That restriction
says “any third party” without an exception for regulatory authorities, covering the patently absurd
situation where the city’s pilots can’t disclose flight logs or telemetry to the FAA or even ATC.</p>
<p>None of this is in the MSA that council reviewed and approved. The MSA has no terms concerning the
drone program. If counsel is right that the MSA controls, the original drone terms are dead and
there is nothing governing drone operations, FAA certification, pilot responsibilities, or risk of
loss.</p>
<p>If the original terms survive through the Order Form’s incorporation clause, Dunwoody is responsible
for everything: the pilots, the certifications, the waivers, the airworthiness, and the losses,
while Flock owns the data the drones generate. Because it’s an order form, the MSA’s conflicts
clause is inapplicable.</p>
<p>Either way, council and residents were told they had a negotiated deal: they don’t.</p>
<h3>The State of Madlibs</h3>
<p>Then there are the ForceMetrics terms signed by the city. Those were stapled to a Flock order form
in February 2025. ForceMetrics is a data aggregation and analytics platform that pulls together
internal databases like CAD (dispatch), RMS (records management), and JMS (jail management).</p>
<p>@<a href="https://footnote4a.org/blog/dunwoody-deal/FLOCK_3.pdf" class="collapsible">ForceMetrics Terms and Conditions</a></p>
<p>The “Informed Responder” product Dunwoody uses “<a href="https://www.police1.com/police-products/police-technology/publicsafetysoftware/forcemetrics-secures-22m-to-scale-groundbreaking-decision-assist-platform-empowering-first-responders-to-make-better-decisions-in-real-time">surfac[es] real-time Safety Signals</a> in search
results,” to give “first responders quick, actionable insights into critical risks—such as mental
health issues, dementia, drug use and domestic violence.”</p>
<p>The ForceMetrics agreement assigns itself a forever-license and ownership of all “Derived Data”, and
claims to be the “final, complete and exclusive agreement between the Parties relating to the
subject matter hereof”.</p>
<p>ForceMetrics receives federally-regulated criminal history record information and criminal justice
information, like names, addresses, and domestic violence histories. It also gets information about
mental health and substance history, categories that may be federally protected health information.</p>
<p>To add to this mess, the ForceMetrics terms set a different liability cap (“[t]o the extent
authorized by the constitution and the laws of the State of ____,” nobody filled in the blank) and
say any conflicts will be handled according to Colorado, not Georgia, law.</p>
<h2>Flock Understands and Acknowledges</h2>
<p>At the meeting, the most bizarre clause in the agreement was not questioned by council:</p>
<blockquote>
<p>Flock understands and acknowledges that prior to Customer contracting for or using any new Flock
Services that it does not use as of the Effective Date, Customer must obtain approval from the
City Manager of Customer</p>
</blockquote>
<p>Why Flock’s understanding matters is anyone’s guess. It could be a way to nullify any effect of the
clause because it doesn’t place an affirmative duty on anyone, it merely says Flock understands
something. At least someone does.</p>
<p>Looking past that, “any new Flock Services” presumably come with additional legal terms. Those
terms, as we’ve seen here, tend to have significant effects on liability and obligations. For
example, when the Flock Services send 911 caller data to parties like Invictus, or when the Flock
Services come with a requirement to maintain FAA-certification.</p>
<p>In any organization with even slight governance in place, entering into those types of agreements is
not something a staff member should be able to do, with or without city manager approval. The city
attorney and city council should have a say.</p>
<p>Not here. Dunwoody PD will keep signing agreements without legal review or council approval. Flock
will continue to operate its Dunwoody Lab as it has for years.</p>
<p>The MSA requires some software toggles without requiring a setting. The AI-training prohibition can,
and likely will, be easily voided via an email from the city manager. Every single structural
problem is left untouched: the data ownership, the liability cap that zeroes out on a prepaid
contract, the order form chain that either governs nothing or governs too much, the ForceMetrics
terms governed by a different state’s law with an unfilled blank in the indemnity clause, and the
911 contract that exists entirely outside of the scope of the MSA.</p>
<p>If there is ever a contractual violation severe enough not to be hand-waved away, one the PD and
council find more concerning than using children in the pool for sales demos, Dunwoody will now have
to spend a small fortune on litigating the mess it has allowed Flock to create.</p>
<p>Of course, when such contractual violations can be waved away with a vague assurance that it won’t
happen again, Dunwoody is unlikely to stand up to Flock and to assert its contractual rights.</p>
<p>A public commenter characterized the relationship as abusive. That’s exactly what it looks like.</p>
<hr>
<div class="text-sm">
Updated to reflect Jill Dunn's position as outside counsel, not city attorney. Added links to
the meeting and its transcript.
</div>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>I have not seen the terms of the city’s specific agreement, but a standard Wing license is
$3,000 per camera per year. There are about a dozen cameras in the rec center. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>The contract provided in response to an open records request is unexecuted — it has no
signatures and no dates in the signature block. For convenience, I’m assuming an executed
version of the same document exists, despite a complete lack of evidence to support that. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>“Customer is not permitted to remove, reposition, re-install, tamper with, alter, adjust, or
otherwise take possession or control of Flock Hardware.” <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>As recently as July 2025, <a href="https://www.thezerolux.com/kerrvilles-drone-collision-and-the/">a Texas DPS drone collided with a military helicopter</a>. The
cops lied about it. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>contract-procurement</category>
        </item>
        <item>
            <title><![CDATA[The More the Logs Change, the More the Oversight Stays the Same]]></title>
            <link>https://footnote4a.org/news/immutable-redux</link>
            <guid isPermaLink="false">https://footnote4a.org/news/immutable-redux</guid>
            <pubDate>Wed, 08 Apr 2026 22:00:00 GMT</pubDate>
            <description><![CDATA[Flock Safety audit log entries — including unique IDs and timestamps — change between downloads, with 3-7% of records swapping daily. Because of course they do.]]></description>
            <content:encoded><![CDATA[<p>I’ve probably mentioned the mutability of the “permanent audit log” <a href="colwell-files">once</a> or
<a href="secret-searches-part2">twice</a> before. There is even a <a href="https://footnote4a.org/irregular-records">record irregularities
report</a> where you can watch entries change organizations, time, and users.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> Now,
Flock is stepping up its mutations game. The unique event identifiers that are supposed to be the
rug tying the room together now fluctuate in the audit logs.</p>
<h2>The Search IDs</h2>
<p>Around the time <a href="colwell-files">Flock made heavy-handed edits</a> to existing government records, it
added, or started to expose, an “id” field along with search results. From the outset,
<a href="http://haveibeenflocked.com">haveibeenflocked.com</a> has ignored that field because Flock can’t be trusted to keep anything stable.
As we’ll see here.</p>
<p>I don’t use Flock’s IDs and instead rely on
<a href="https://footnote4a.org/about/duplicates">other methods to handle duplicate entries</a>, so I mostly ignore them. Then I
received an email from someone who paid more attention. He had been manually downloading audit logs
from transparency portals and comparing the files, noticing that entries change more than they
should.</p>
<p>To be honest, I didn’t really believe him at first. It sounded implausible even for Flock to do
something so technically terrible. Egg on my face.</p>
<p>Transparency portal search logs now typically look something like this:</p>
<pre><code class="language-csv">e71b39a6-3cc8-4161-b4ec-e62c6e1cd135,***,2026-03-04T20:37:04.924Z,6050,invest
</code></pre>
<p>Because <a href="secret-searches-part2">cops can’t be trusted with cop data</a>, Flock’s network logs look
about the same. In addition to the ID, they have a name of an agency. The idea is that an auditing
PD will pick up the phone, relay the ID in their network log to the named agency, and verify that
“invest” was a legitimate search.</p>
<p>With about 6,000 agencies doing 10,000+ searches per day, that’s a lot of phone calls.</p>
<p>This idea is obviously completely divorced from reality to begin with, but it’s being used — to
great effect — to convince uncritical elected officials of the existence of accountability.</p>
<p>Now, I’m not sure what cops are supposed to do.</p>
<h2>The Time and ID Changes</h2>
<p>The transparency portal logs are produced on a 30 day rolling basis. So, if you downloaded the same
log a day apart, you’d expect to see 29 days worth of identical records with one day trimmed and one
day added. However …</p>
<p>On March 23, 2026, West Des Moines’ log showed these two searches:</p>
<pre><code class="language-csv">e71b39a6-3cc8-4161-b4ec-e62c6e1cd135,***,2026-03-04T20:37:04.924Z,6050,invest
bc377b4b-2261-4fe1-a96c-ebb59217c061,***,2026-03-04T21:00:31.190Z,6051,invest
</code></pre>
<p>Two searches on March 4, both labeled “invest,” one at 8:37pm (UTC), and one at 9pm (UTC).</p>
<p>On March 24, 2026, they are both gone. In their place are two new searches:</p>
<pre><code class="language-csv">9c685baa-cf80-478c-acf1-2df174a1d686,***,2026-03-04T20:26:48.972Z,6050,invest
ec162dff-51b1-4de6-be2d-16a2b2cd8411,***,2026-03-04T21:39:47.263Z,6051,invest
</code></pre>
<p>The also both happened on March 4, and are both labeled “invest,” but now one happened at 8:26pm
(UTC) and the other at 9:39pm (UTC). That’s a significant difference.</p>
<p>If the same change happened in network logs, and if anyone had made that phone call about search ID
<code>e71b39a6-3cc8-4161-b4ec-e62c6e1cd135</code>, they would have to make another phone call about the search
that replaced it: <code>9c685baa-cf80-478c-acf1-2df174a1d686</code>.</p>
<p>The problem appears broad. In the March 23 – 24 comparison alone (about 200 lines total) there were
multiple changes:</p>
<pre><code class="language-text">-b76afd28-1246-4b3d-91d7-5f14642dd191,***,2026-02-25T20:56:59.751Z,2,Windsor Heights Fresh Stolen
+72db34f8-dd39-4d5d-814c-c968cb5e58b2,***,2026-02-25T20:52:17.101Z,2,Windsor Heights Fresh Stolen

-e71b39a6-3cc8-4161-b4ec-e62c6e1cd135,***,2026-03-04T20:37:04.924Z,6050,invest
-bc377b4b-2261-4fe1-a96c-ebb59217c061,***,2026-03-04T21:00:31.190Z,6051,invest
+9c685baa-cf80-478c-acf1-2df174a1d686,***,2026-03-04T20:26:48.972Z,6050,invest
+ec162dff-51b1-4de6-be2d-16a2b2cd8411,***,2026-03-04T21:39:47.263Z,6051,invest

-b8afc2dc-434c-41e3-8614-92134e713de8,***,2026-03-05T07:58:19.466Z,1169,
+3c652fad-db99-472f-bf7a-16430beb949d,***,2026-03-05T07:01:14.526Z,1169,

+8e10d1fb-2b66-4a0a-b4a8-2ef4b4f33899,***,2026-03-15T05:12:16.454Z,1,invest
-95134732-9341-420e-b830-901856bd4a75,***,2026-03-15T05:39:30.257Z,1167,invest

-e6941d9c-fbf2-4cbb-a54b-7c5d1fd391cb,***,2026-03-19T18:49:41.776Z,1166,
-d277a79e-0a14-4ccd-a561-8df2cfb7ca10,***,2026-03-19T19:00:37.487Z,1166,
+6f9738b1-1fbf-498a-b026-c8eda3d3aece,***,2026-03-19T18:22:11.557Z,2,
+18bf73c6-e37c-4246-ab1c-f98aae2849a6,***,2026-03-19T19:14:27.501Z,1166,
</code></pre>
<p>In this one file, about 7% of records changed within 24 hours.</p>
<h2>Clanker Analysis</h2>
<p>Asking the clanker to analyze the changes over multiple files it wrote a little Python script and
produced:</p>
<h3>WDM (8 snapshots, Mar 16 - Apr 4)</h3>
<p><strong>Non-rolling change rate per snapshot pair: 2.6% - 7.1%</strong> (avg ~5%)</p>
<table>
<thead>
<tr>
<th>Comparison</th>
<th>Removed</th>
<th>Added</th>
<th>Modified</th>
<th>Rate</th>
</tr>
</thead>
<tbody>
<tr>
<td>03-16 → 03-22</td>
<td>4</td>
<td>4</td>
<td>0</td>
<td>3.3%</td>
</tr>
<tr>
<td>03-22 → 03-23</td>
<td>7</td>
<td>7</td>
<td>0</td>
<td>6.6%</td>
</tr>
<tr>
<td>03-23 → 03-24</td>
<td>7</td>
<td>7</td>
<td>0</td>
<td>6.7%</td>
</tr>
<tr>
<td>03-24 → 03-25</td>
<td>8</td>
<td>8</td>
<td>0</td>
<td>7.1%</td>
</tr>
<tr>
<td>03-25 → 03-26</td>
<td>6</td>
<td>6</td>
<td>0</td>
<td>5.2%</td>
</tr>
<tr>
<td>03-26 → 03-27</td>
<td>3</td>
<td>3</td>
<td>0</td>
<td>2.6%</td>
</tr>
<tr>
<td>03-27 → 04-04</td>
<td>4</td>
<td>4</td>
<td>0</td>
<td>3.3%</td>
</tr>
</tbody>
</table>
<p>Key patterns:</p>
<ul>
<li><strong>Removals always equal additions</strong> — records are being swapped, not just deleted or added. This
is highly suspicious and suggests some kind of rotation/replacement mechanism.</li>
<li><strong>No field modifications</strong> — records are never edited in place; they vanish and a different record
with the same date appears.</li>
<li><strong>17 “flickering” records</strong> that disappear and reappear across snapshots. Example: <code>95134732...</code>
(date 03-15) appears in only the 03-23 and 03-25 snapshots out of 8 — pattern <code>..Y.Y...</code></li>
</ul>
<h3>Johnston (3 snapshots)</h3>
<p>Similar pattern: 3.9% - 8.2% non-rolling change rate, removals always equal additions, 2 flickering
records.</p>
<h2>The Takeaway (AI)</h2>
<p>When it was done running its script, it gave its unsolicited, but almost accurate “key takeaway”:</p>
<blockquote>
<p>The audit logs are <strong>not immutable</strong>. Every day, ~3-7% of records within the overlapping date
window are swapped out (equal number removed and added, zero modifications). Some records flicker
in and out across multiple snapshots, meaning the same record can be removed, reappear, and be
removed again. This is consistent with records being retroactively added/removed from the audit
log on an ongoing basis.</p>
</blockquote>
<h2>The Actual Takeaway</h2>
<p>This is the straightforward explanation, but it’s not necessarily what’s happening. What could be
happening is that Flock, like Axon, is distributing its database in an effort to sidestep
accountability and ownership by conflating data control and data ownership.</p>
<p>I’ve called this nonsense out before as Flock saying the kitchen is not a central repository for
pots and pans, because it has multiple cupboards.</p>
<p>But it may be what we’re seeing here. The log could be pulling in different entries from different
“cupboards”, and not all “cupboards” may be available each time the log runs.</p>
<p>A distributed explanation is not any better than deleting and adding records in a centralized
database. In fact, it would be a very fundamental, very fatal, flaw for records that are supposed to
be immutable — like audit records — to have multiple copies in multiple places without a single
authoritative copy.</p>
<p>Apparently log entries can go missing without Flock’s system throwing an error. If you can’t be sure
that your log is complete, you can’t rely on it to show whatever it is you’re auditing for — it may
have been deleted.</p>
<p>If you’re getting new results every day, your previous audits are automatically invalid and
unreliable. A search that occurred at 9pm may look valid, but if a police officer goes off shift at
9:30pm and the next day the log shows the search happened at 9:45pm, that’s potentially unflagged
off-duty use of a police system.</p>
<p>It could also cut the other way: the officer’s shift might not start until 9:30pm, and the logs will
show improper use the first time around, but not the second (if anyone looks).</p>
<h2>Network Logs</h2>
<p>These observations are from transparency portal logs, which are largely performative to begin with.
Whether the same holds in a network audit remains to be confirmed.</p>
<p>Examining older network logs, which did not have the IDs, entries can be seen disappearing between
runs. Because I do not have enough overlapping data to fully confirm, I can only say that it seems
very likely that the observed ID changes in West Des Moines and Johnston show a structural problem
that has existed for a while now.</p>
<p>This finding alone should be cause to invalidate all prior audits, as well as all future audits
until Flock addresses the problem.</p>
<p>States with mandatory audits, like Minnesota, and police departments with audit requirements, will
have to redo their audits after it’s fixed. That’s a lot of phone calls.</p>
<p>That is, if they want to make good on their promises of accountability and oversight.</p>
<p>I won’t be waiting by the phone.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>The <a href="https://footnote4a.org/irregular-records">irregular records report</a> was a little unstable because of all
the redactions. As of today, it tries to be a little smarter about identifying duplicates even
with limited data. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>audit-log-analysis</category>
        </item>
        <item>
            <title><![CDATA[Within 24 Hours]]></title>
            <link>https://footnote4a.org/news/april-6-2026</link>
            <guid isPermaLink="false">https://footnote4a.org/news/april-6-2026</guid>
            <pubDate>Tue, 07 Apr 2026 16:00:00 GMT</pubDate>
            <description><![CDATA[Milk ages slower.]]></description>
            <content:encoded><![CDATA[<p><img src="https://footnote4a.org/blog/april-6-2026/linkedin.webp" alt="LinkedIn" width="300"></p>
<p><img src="https://footnote4a.org/blog/april-6-2026/kshb.png" alt="KSHB"></p>
<p>Via <a href="https://ipvm.com/reports/flock-invasive">IPVM</a> and <a href="https://www.kshb.com/news/crime/affidavit-former-bonner-springs-detective-used-license-plate-cameras-to-stalk-wife">KSHB</a></p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>quick-takes</category>
        </item>
        <item>
            <title><![CDATA[Flock Goes Global: How a $7.5 Billion Surveillance Company Found Its International Partner in South Africa's Most Controversial Camera Network]]></title>
            <link>https://footnote4a.org/news/vumacam-flock</link>
            <guid isPermaLink="false">https://footnote4a.org/news/vumacam-flock</guid>
            <pubDate>Sun, 05 Apr 2026 18:00:00 GMT</pubDate>
            <description><![CDATA[Vumacam sells Flock surveillance in South Africa. Its founder was criminally investigated for operating unlicensed cameras. Its cameras have been called digital apartheid. It all tracks.]]></description>
            <content:encoded><![CDATA[<p>Flock Safety has spent the last year telling American cities that its surveillance network is
accountable, auditable, and locally controlled. Cities have <a href="https://www.npr.org/2026/02/17/nx-s1-5612825/flock-contracts-canceled-immigration-survillance-concerns">canceled contracts</a>. Citizens have
<a href="https://techcrunch.com/2026/02/23/americans-are-destroying-flock-surveillance-cameras/">cut down camera poles</a>. The ACLU has been <a href="https://www.aclu.org/news/privacy-technology/flock-pushback">publishing investigations</a>. The EFF has
<a href="https://www.eff.org/deeplinks/2025/12/effs-investigations-expose-flock-safetys-surveillance-abuses-2025-review">catalogued abuse</a>.</p>
<p>The company got caught <a href="overseas-data">sending data to Upwork contractors</a> and
<a href="dps-denmark">Denmark</a>. The CEO <a href="staunton-attack">declares Flock is under attack</a>. The <a href="trust-me-bro">CISO
denies</a> high-profile, <a href="never-hacked-facts">very real security issues</a>. The permit
manager installs <a href="riverside-permits">cameras without adequate permits in California</a>,
<a href="dot-permits">Iowa</a>, and other states. The VP of Solution Engineering <a href="colwell-files">redacts information from log
files</a>. The Chief Legal Officer appears on <a href="racist-cops">niche livestreams</a>. And
marketing, seemingly sponsored by the City of Dunwoody, <a href="drone-as-dataleak">pumps out questionable
videos</a>.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>You’d think Flock has enough to worry about at home. Now it’s going international.</p>
<p>We already know what Flock’s jurisdictional sprawl looks like domestically. The Virgin Islands
Police Department — a Caribbean territory under an active DOJ consent decree for unconstitutional
policing — <a href="vi-ar">was caught querying Flock cameras in Rogers, Arkansas</a> for stolen vehicles and
traffic violations. No one in Flock’s 5,000+-agency network — including Flock and the state agencies
responsible for criminal justice information — has flagged that absurdity.</p>
<p>Now take that indifference and remove the American legal framework entirely.</p>
<p>Flock’s first(?) international reseller is Vumacam. A Johannesburg-based company that has
been accused of building a digital apartheid, charged by regulators for operating without a license,
and caught making false claims under oath about data protection compliance.</p>
<p>Sounds about right.</p>
<h2>The Partner: Ricky Croock</h2>
<p>Flock’s partner page lists Vumacam as a “channel provider”:</p>
<blockquote>
<p>Vumacam is Flock Safety’s reseller partner in South Africa. The partnership extends Flock’s
technology internationally, fostering safer communities abroad.</p>
</blockquote>
<div class="not-prose">
    <img src="https://footnote4a.org/blog/vumacam-flock/partner-linkedin-image.png"
        alt="Partner Event image with Flock and Vumacam"
        class="mx-auto w-[500px]">
    <div class="text-sm text-center w-full italic">
    Via Ricky Croock's LinkedIn (spelled as "Ricky Crook" here).
    </div>
</div>
<p>Vumacam operates a network of over 7,000 cameras across South Africa’s Gauteng province — the
majority concentrated in Johannesburg. The company was founded by Ricky Croock, a former private
security operator who previously ran CSS Tactical, a company providing armed response, guarding, and
CCTV services.</p>
<p>If you thought the Flock model couldn’t get worse: Croock found a way. Vumacam builds and maintains
the camera infrastructure — poles, cameras, connectivity — and then sells access to private security
companies, who pay a monthly fee for video feeds in their patrol areas.</p>
<p>The network includes over 2,000 automatic license plate recognition cameras that, as of 2021,
scanned an estimated 9.68 million vehicle registrations per day. That figure has likely grown
substantially alongside the network’s expansion to 7,000 cameras.</p>
<p>If this sounds like Flock, that’s because it is.</p>
<h2>Croock and Vumacam’s History</h2>
<p>The critical reporting on Vumacam is extensive, spanning investigations by MIT Technology Review,
Daily Maverick, VICE, and the Pulitzer Center.</p>
<h3>Operating Without Registration</h3>
<p>South Africa’s Private Security Industry Regulatory Authority (PSIRA) <a href="https://www.citizen.co.za/lifestyle/entertainment/who-watches-big-brother-joburgs-private-surveillance-cameras-come-under-fire/">charged both Vumacam and
Croock personally</a> with a code of conduct violation for operating a security business while
unregistered with the authority.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> Police opened a parallel criminal investigation. Vumacam
subsequently registered, but PSIRA confirmed both the criminal case and the code of conduct probe
remained active.</p>
<p>For a company building a city-wide surveillance network, the sequence is notable: deploy first,
register later. <a href="speed-cameras">Flock has its own version of this approach</a> where hundreds of
cameras were installed on public roads without permits across Florida, Illinois, South Carolina,
Texas, and North Carolina, with an Illinois DOT official receiving a thinly veiled threat that Flock
would send “<a href="https://www.jalopnik.com/license-plate-surveillance-startup-broke-the-law-while-1851289764/">about 30 different police chiefs</a>” to the office if permits weren’t
fast-tracked. And that’s just the states that have taken some form of action.</p>
<h3>Lying Under Oath</h3>
<p>In a sworn affidavit to the Gauteng High Court, Croock stated that Milestone VMS — the video
management software Vumacam uses — was “certified GDPR-compliant under the General Data Protection
Regulation applicable under European Union law.” <a href="https://www.dailymaverick.co.za/article/2021-09-25-vumacams-hundreds-of-thousands-of-cameras-will-be-watching-you/">Daily Maverick’s investigation</a> found this
was not true. EuroPriSe, the certification body, had not officially accredited Milestone; the
application was still pending.</p>
<p>Croock also told the court that Milestone “ensures responsible use of data by end users.”
Milestone’s documentation says the opposite: users, not the software, bear responsibility for
compliance.</p>
<p>We’ve heard these types of assertions before. Flock’s CEO Garrett Langley told the public that Flock
had no federal contracts. That was <a href="the-platform">also not true</a>. Flock was running a pilot program
giving Customs and Border Protection and ICE direct access to data from its cameras. After
information about the program became public, Flock stated it shut it down, but quietly continued to
run it.</p>
<p>And, of course, Flock has also <a href="never-hacked-facts">claimed all sorts of compliance</a>, including
compliance with HECVAT, which is a <a href="staunton-attack">vendor evaluation form</a>, and CJIS ACE — a
commercial certificate, every bit as valid as the official <a href="https://ko-fi.com/s/b75c5f1286">Certified Privacy Advocate
Certificate</a> from <a href="http://haveibeenflocked.com">haveibeenflocked.com</a>.</p>
<h3>“We don’t track people or cars”</h3>
<p>Exactly like Flock claims in the US, Vumacam has publicly claimed its system “does not track people
or cars.” <a href="https://www.dailymaverick.co.za/article/2021-09-08-heres-how-johannesburg-security-cameras-track-you/">The company’s marketing materials</a> also echo Flock’s — which makes sense, given it
is a reseller — and show that the system can retrospectively map a vehicle’s complete movements over
30 days. Precisely the definition of tracking.</p>
<p>Private security companies can add registration numbers to watchlists without court orders. Police
can request location data through private security databases without subpoenas or warrants.</p>
<p>That’s true in America and South Africa.</p>
<h3>Digital Apartheid</h3>
<p>The “digital apartheid” criticism is the most damning line of criticism against Vumacam, and it’s
also the most structurally relevant to understanding what Flock’s technology does, both
domestically and abroad.</p>
<div class="not-prose">
    <img src="https://footnote4a.org/blog/vumacam-flock/safecity-cam.png"
        alt="A SafeCity pole in Sandton, in northern Johannesburg."
        class="mx-auto max-w-full">
    <div class="text-sm text-center w-full italic">
    A SafeCity pole in Sandton, in northern Johannesburg.
    </div>
</div>
<p>Vumacam deployed its cameras almost exclusively in affluent, predominantly white suburbs of
Johannesburg because that’s where paying customers were. Poor Black townships were left uncovered,
not out of principle, but because there was no revenue model — nobody hires ADT or other security
companies there. The result is a surveillance geography that maps onto apartheid-era spatial
divisions with uncomfortable precision.</p>
<p>Flock declines to release its camera locations and many cities have refused to release Deployment
Plans and other documentation. Efforts like <a href="https://deflock.org">Deflock</a> are underway and are
beginning to draw Flock devices on the same maps as America’s apartheid-era <a href="https://dsl.richmond.edu/panorama/redlining/">redlined
districts</a>.</p>
<p>A leaked shift report from Fibrehoods, a Vumacam partner, <a href="https://www.technologyreview.com/2022/04/19/1049996/south-africa-ai-surveillance-digital-apartheid/">documented 14 incidents flagging 28
people as “suspicious.”</a> — a term that’s <a href="https://footnote4a.org/reason-cloud">commonly found in Flock logs</a> as a
<a href="search-reasons">“justification” for retrieving 30-day location histories</a>. All 28 “suspicious”
persons in the shift report were Black. The suburbs in question were majority-white.</p>
<p>Michael Kwet, a visiting fellow at Yale Law School who studies the South African surveillance
industry, <a href="https://www.vice.com/en/article/smart-cctv-networks-are-driving-an-ai-powered-apartheid-in-south-africa/">drew a direct line</a> to the apartheid-era <em>dompas</em> — the internal passport system
that restricted Black people’s movement in white enclaves. Vumacam (x Flock)'s AI-powered camera
network recreates this digitally: Black residents in historically white suburbs are surveilled,
flagged, and tracked.</p>
<p>Police in the US say they need Flock <a href="racist-cops">to stop them from pulling Black people out of cars at
gunpoint</a>. South Africa shows what actually happens when surveillance infrastructure is
deployed by private companies in a society with deep racial stratification.</p>
<p>Intent is irrelevant. The business model is what matters.</p>
<h2>Why This Partnership Matters</h2>
<p>Flock’s domestic troubles are well-documented on this site and elsewhere. Secret data sharing,
<a href="the-platform">secret employee access to camera networks</a>, cameras installed <a href="riverside-permits">without
permits</a>, a CEO who <a href="https://www.aclu.org/news/privacy-technology/flock-ceo-goes-ballistic">goes ballistic</a> rather than address concerns, and
these types of hits keep on coming while the company only offers empty promises through increasingly
snazzy marketing videos.</p>
<p>The Vumacam partnership introduces something new. The <a href="vi-ar">Virgin Islands querying Arkansas
cameras</a> was a preview — absurd, unmonitored, jurisdictionally incoherent, but still
technically domestic. It’s the diet version of what’s happening in South Africa.</p>
<p>In the United States, Flock’s surveillance network technically operates within — however loosely and
poorly enforced — a framework of Fourth Amendment protections, state privacy laws, US DoJ policies,
FOIA requests, city council votes, and the kind of public pressure that gets contracts canceled.</p>
<p>In South Africa, Vumacam successfully sued the Johannesburg Roads Agency when the agency tried to
suspend its camera permits, and the court ruled that <a href="https://www.cliffedekkerhofmeyr.com/en/news/publications/2020/dispute/Dispute-Resolution-Alert-20-October-2020-Administrative-bodies-Stay-in-your-lane-.html">the JRA’s job was to protect road
infrastructure, not human rights</a>. No civil society organization has brought a subsequent case.
The Information Regulator’s investigation into POPIA compliance appears to have produced no public
enforcement action.</p>
<p>Flock gets to sell its technology into this environment through a reseller. It is insulated from
direct accountability while Vumacam gets access to the surveillance platform of a $7.5 billion
company backed by Andreessen Horowitz and Founders Fund.</p>
<p>Vumacam wants to be Flock as much as Flock wants to be Vumacam.</p>
<h2>The Response</h2>
<p>SafeCity — featured in the backdrop for the event photo where Flock, Matrix, and Vumacam promote the
partnership — is Vumacam’s premium product tier. It is the pitch to government. In February 2024,
Vumacam announced a partnership with the Gauteng provincial government giving officials access to a
network of over 6,000 cameras and “advanced crime-fighting technologies.”</p>
<p>Response times dropped, the company says, from 18–30 minutes to 5–10 minutes.</p>
<p>Last month, in March 2026, apartheid police commander Eugene de Kock, nicknamed “Prime Evil”
<a href="https://apnews.com/article/south-africa-apartheid-killings-inquiry-police-ce81c4459c4685d3680d6543e075c30d">testified in court</a> about the atrocities he committed in the name of public safety.</p>
<p>Now, South Africa evaluates a high-tech mass surveillance network that replicates apartheid-era
movement controls and lack of oversight that let <em>Prime Evil</em> act with impunity when his
security forces <a href="https://apnews.com/article/apartheid-south-africa-killings-cradock-four-51e910faa6bc7251f081ec5eb97c601e">abducted, tortured and killed activists</a>.</p>
<p>When Flock’s critics — “activists” mounting a “coordinated attack” <a href="staunton-attack">according to its
CEO</a> — warn about what happens when surveillance infrastructure scales without
democratic oversight, they don’t speak in hypotheticals.</p>
<p>Johannesburg proves the outcome: Apartheid 2.0, powered by Flock.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>There will be more in the future, if Flock’s Indeed page is anything to go by. The
company is looking to hire a salaried ($135k–$160k p.a.), Los Angeles-based “Sr. Producer”: “As
Flock’s video output continues to grow in volume, ambition, and operational complexity, the
Senior Film Producer role is responsible for owning all pre-production and on-site production
logistics that make high-quality video possible.” <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Flock did similar in <a href="https://www.newsobserver.com/news/state/north-carolina/article290872709.html">North Carolina</a> and <a href="https://www.houstonchronicle.com/news/houston-texas/article/flock-camera-investigation-22096147.php">Texas</a>, and continues
to operate without required licenses in states like Iowa. US regulators are seemingly not as
effective as South Africa’s. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[No Permit, No Problem: California Governor Hopeful Chad Bianco's 500+ Unauthorized Surveillance Cameras]]></title>
            <link>https://footnote4a.org/news/riverside-permits</link>
            <guid isPermaLink="false">https://footnote4a.org/news/riverside-permits</guid>
            <pubDate>Mon, 30 Mar 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[Riverside County issued three encroachment permits for 500+ Flock surveillance cameras to the wrong permittee and based on incomplete applications. Then it let them lapse for over a year. Bianco and Flock continued to operate them.]]></description>
            <content:encoded><![CDATA[<p>Riverside County’s encroachment permit record for its Flock Safety camera deployment is a case study
in what happens when a county rubber-stamps a surveillance system and forgets to do the paperwork.
Or the oversight. Or the legal prerequisites. Or, for 13 months, the permits.</p>
<p>In 2021, the Riverside County Transportation Department issued the first of three encroachment
permits to the Riverside County Sheriff’s Department for the installation of Flock Safety cameras on
county roads. By October 2023, the Board of Supervisors had <a href="https://abc7.com/post/riverside-county-license-plate-reading-cameras-lpr-camera/14004952/">unanimously approved</a> a $6.9
million contract to expand the program to 538 cameras.</p>
<p>Four and a half years later, the <a href="https://archive.vn/uuiy3">Riverside County Sheriff’s Department’s Flock Transparency
Portal</a> shows the sheriff uses 1,718 “<abbr class="md-tooltip" data-tooltip="License Plate Reader">LPR</abbr> <a href="speed-cameras">and other cameras</a>.”</p>
<p>A <abbr class="md-tooltip" data-tooltip="California Public Records Act">CPRA</abbr> request to the Transportation Department produced three permits, a handful of emails, and a
sworn declaration that may be more interesting than the permits themselves.</p>
<h2>The Permits</h2>
<p>Riverside County Ordinance 499 governs encroachments within county highway right-of-way. Any
structure placed in the road right-of-way — including 13-foot surveillance poles with cameras and
solar panels — requires a written permit from the Director of Transportation.</p>
<p>@<a href="https://footnote4a.org/blog/riverside-permits/ordinance-499.pdf" class="collapsible">Riverside County Ordinance 499 (as amended through 499.16)</a></p>
<p>Three such permits were issued:</p>
<h3>ENC21120546 (December 10, 2021 – September 1, 2023)</h3>
<p>Originally authorized two cameras. Expanded through riders to cover 33 named locations and a blanket
permission to add more via individual location notifications (RD Form 136).</p>
<p>@<a href="https://footnote4a.org/blog/riverside-permits/enc21120546-permit.pdf" class="collapsible">ENC21120546 — Original Permit</a></p>
<p>@<a href="https://footnote4a.org/blog/riverside-permits/enc21120546-rider1.pdf" class="collapsible">ENC21120546 — Rider 1</a></p>
<p>@<a href="https://footnote4a.org/blog/riverside-permits/enc21120546-rider2.pdf" class="collapsible">ENC21120546 — Rider 2</a></p>
<h3>ENC23110539 (November 14, 2023 – November 14, 2024)</h3>
<p>An annual blanket permit covering “various county road rights of way.” This permit was explicitly
styled as an extension of the first.</p>
<p>@<a href="https://footnote4a.org/blog/riverside-permits/enc23110539-permit.pdf" class="collapsible">ENC23110539 — Second Blanket Permit</a></p>
<h3>ENC25061408 (December 5, 2025 – December 5, 2026)</h3>
<p>Another annual blanket permit, the current one. It was issued with a single RD Form 136
notification on file — one camera, in Anza — and four total documents in the folder.</p>
<p>@<a href="https://footnote4a.org/blog/riverside-permits/enc25061408-permit.pdf" class="collapsible">ENC25061408 — Current Blanket Permit</a></p>
<h2>No Permit, No Problem</h2>
<p>The second permit expired on November 14, 2024. The third was not issued until December 5, 2025.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>During those 13 months, the cameras did not come down. The $6.9 million contract continued and
Flock’s operations apparently continued without interruption under Riverside County Sheriff and
Republican gubernatorial candidate Chad Bianco’s watch.</p>
<p>Ordinance 499 Section 6 prohibits anyone from “constructing, installing, operating, or maintaining”
any structure in the county right-of-way without a permit. That’s not limited to construction — it
covers the cameras just sitting there running.</p>
<p>The permits themselves reinforce this. The authorized work is not just installation — each permit
grants permission to “install, operate and maintain” the cameras. Each is “to be strictly construed
and no work other than that specifically mentioned above authorized hereby.”</p>
<p>When the permit expires, so does the authorization to operate and maintain. The first permit’s void
date was extended twice via riders — acts that only make sense if the date is an operative
constraint. And in December 2025, the county issued a replacement permit with identical scope and
authorization language. If the prior permit was still valid, the replacement was redundant.</p>
<p>The second permit’s own conditions made the obligation explicit. Condition M12 on ENC23110539
states: “Upon expiration of this permit, the permittee shall remove the temporary poles and
cable.”<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> The current permit repeats this language and adds: “It is the Permittees
responsibility to maintain a valid permit.” The permittee did neither.</p>
<p>Nothing was removed. No extension was obtained. No replacement was issued for thirteen months.</p>
<p>The <abbr class="md-tooltip" data-tooltip="California Public Records Act">CPRA</abbr> request covered all encroachment permits issued between January 2020 and March
2026. The county produced exactly three. The county certified under oath that no other
encroachment permit, extension, or authorization exists.</p>
<h2>No Application, No Problem</h2>
<p>The county requires each permit application to be “in the name of the person, agency, entity, or
authorized agent owning the encroachment and controlling the construction of the work.” It adds that
the county “would require documentation of the Utility Owner’s authorization of a third party
seeking a Permit on behalf of the Utility Owner.”</p>
<p>The applications list “Flock Safety” as applicant and owner — correctly, since Flock owns and
installs the cameras. Three different Flock employees signed applications over the life of the
program: Danny Campos, Will Warren, and Derek Porcella.</p>
<p>But the permits were not issued to Flock. They were issued to “Riverside County Sheriff Department
C/O FLOCK SAFETY.” The Sheriff’s Department is the permittee on all three permits — holding
the obligations, the liability, the strict construction clause — despite never having applied for
them. There is no application from the Sheriff’s Department on file. No one at the Sheriff’s
Department signed anything.</p>
<p>Flock applied. The Sheriff’s Department got the permits. And no authorization exists connecting the
two. The county certified under oath that there are no letters of agency, powers of attorney, or
similar documents from Flock authorizing the Sheriff’s Department — or anyone — to hold
encroachment permits on Flock’s behalf. Nor are there any documents from the Sheriff’s Department
authorizing Flock to apply on its behalf.</p>
<p>The county seemingly decided on its own that a permit applied for by “Applicant/Owner: Flock Safety”
should be issued to the Sheriff’s Department. And Flock apparently decided that it could treat that
permit as its own and forge ahead with installation.</p>
<p>And this didn’t happen once. The third permit application was byte-for-byte identical to the second
one. The exact same PDF was filed under both permit numbers. Same date (November 7, 2023), same agent
(Derek Porcella), same Flock Safety mailing address in Atlanta, same description of work, same
signature.</p>
<p>And the same outcome: the new permit was also issued to the Sheriff’s Department, not the applicant.</p>
<p>@<a href="https://footnote4a.org/blog/riverside-permits/enc23110539-application.pdf" class="collapsible">Permit Application — ENC23110539 / ENC25061408 (dated 11/7/2023)</a></p>
<h2>No Authority, No Problem</h2>
<p>This is the part that likely matters most, legally.</p>
<p>Riverside County Ordinance 499 Section 6 states that permits “will be issued for only Utility
purposes” on county highways. The ordinance defines “Utility” as water, sewer, irrigation, gas,
petroleum, cable TV, electric, and communications facilities. Surveillance cameras are none of these.</p>
<p>For non-utility encroachments, the Director of Transportation may issue a permit if satisfied of
three things: (1) the use is in the public interest, (2) there will be no substantial injury to the
county highway or impairment of its use, and (3) the use is reasonably necessary for the functions
of the applicant.</p>
<p>Flock’s cameras are commercial surveillance products owned and operated by a private company. The
Sheriff’s Department has a software service contract to access Flock’s data — both inside and outside
Riverside County.</p>
<p>The Director’s finding that these cameras satisfy the three-prong test in Section 6 would be the
legal prerequisite for every permit in the chain. Without it, the Director had no authority to issue
any of them.</p>
<p>No such finding accompanied any permit application.</p>
<p>Whether such a finding could survive scrutiny is a separate question. Is a private company’s
occupation of public right-of-way to operate a for-profit surveillance network “in the public
interest”? Is it “reasonably necessary” for Flock’s functions that its cameras sit on county roads
rather than, say, private property with the owner’s consent?</p>
<h2>No Locations, No Problem</h2>
<p>Riverside County has contracted for over 500 Flock cameras. Not all of those are on county roads.
Some are on city streets, some on Caltrans state highway right-of-way, some on private property. The
permit documents include handwritten annotations identifying specific cameras as “NON COUNTY/city,”
“CALTRANS,” and “City St/Grand Terrace.”</p>
<p>Someone at the Transportation Department reviewed the camera deployment list, saw cameras on roads
the county doesn’t control, and marked them accordingly. But no formal record of that analysis was
ever created.</p>
<p>I asked for any records reflecting which of the 500+ cameras are within county highway right-of-way,
or any determination that specific cameras did not require a permit. Again, the county certifies
that no such records exist.</p>
<p>When the county’s records custodian was asked about the gap between 500+ contracted cameras and the
roughly 80 installations documented in the permits, the only response was informal and vague: “some
locations may not have been permitted as they could be private or non county maintained roads.”</p>
<p>That’s it. No spreadsheet, no memo, no analysis. The county issued blanket permits for “various
county roads” — possibly subject to the typical Flock “deployment plan” — but never really
determined which roads it was talking about.</p>
<h2>No Traffic Plans, No Problem</h2>
<p>Every encroachment permit in the production requires a traffic control plan under Condition C05 — a
safety document showing how workers and traffic will be protected when someone is installing
equipment in a roadway. The current permit, ENC25061408, goes further and requires the <abbr class="md-tooltip" data-tooltip="Traffic Control Plan">TCP</abbr> to be
signed by a Professional Engineer.</p>
<p>The county produced one set of traffic control plans: for the Spencer’s Crossing project, eight
cameras, prepared in February 2023 under the first permit.</p>
<p>No other traffic control plans exist.</p>
<p>That’s a 98% noncompliance rate.</p>
<h2>No Fees, No Problem</h2>
<p>Section 15 of the ordinance requires that permit fees be paid “at or after the time application is
filed, but in any event before the Permit is issued.” The fee fields on every application in the
entire production — all three permits, every application, every rider — are blank.</p>
<p>Section 16 exempts public agencies from permit processing fees if they have “lawful authority” to
use the right-of-way for the permitted purpose.</p>
<p>Flock applied in its own name. But the permits were issued to the Sheriff’s Department — a
public agency — triggering the fee exemption. A private surveillance company applied, a public
agency was listed as permittee, no fees were charged, and no one documented why.</p>
<h2>No Records, No Problem</h2>
<p>None of the above rests on inference or supposition. Each point traces back to a single document: a
Declaration of Custodian of Records executed March 23, 2026, signed under penalty of perjury by the
county’s records custodian.</p>
<p>The Declaration addresses each follow-up item individually and certifies that the county has no
responsive records. This is not a case where documents might exist but were missed. This is the
county’s official position, under oath, that these records do not exist.</p>
<p>This is not some isolated paperwork hiccup in Riverside County from a well-meaning county official
unable to find records that really exist. <a href="dot-permits">Across the country</a>, Flock cameras go up on
public roads under permits that <a href="dot-permits-pt2">no one reviews</a>, with safety standards no one
enforces, issued to applicants that no one verifies. Flock routinely operates cameras with expired
permits or <a href="colorado-oversight">without an active contract</a>. Riverside County is one of many.</p>
<p>@<a href="https://footnote4a.org/blog/riverside-permits/declaration-of-custodian-2026-03-23.pdf">Declaration of Custodian of Records — March 23, 2026</a></p>
<h2>The Law in “Law &amp; Order”</h2>
<p>Riverside County’s surveillance camera program operated for over four years under three encroachment
permits issued to an agency that never applied for them, based on applications from a company that
never received them, without the legally required public interest determination, without traffic
control plans for the vast majority of installations, without fees, and — for 13 months — without
a permit at all.</p>
<p>Each of these permits was issued to the Riverside County Sheriff’s Department. Flock — the
owner/operator listed on the permit applications — never received a permit but still installed and
continues to operate hundreds of surveillance cameras without a valid permit.</p>
<p>The $6.9 million contract belongs to Sheriff Chad Bianco’s office. The entire Flock deployment —
from the <a href="https://myvalleynews.com/blog/2021/03/04/riverside-county-sheriff-department-introduces-automated-license-plate-reader-program/">first two cameras in 2021</a> to the 1,718 “LPRs and other cameras” now
in Flock’s system under the sheriff’s name — occurred during his tenure.</p>
<p>Ordinance 499 Section 18 provides that any person who operates without a required permit, or who
violates permit conditions in a way that jeopardizes person or property, is guilty of a misdemeanor
punishable by fine, imprisonment, or both.</p>
<p>The wrong permittee is not a technicality. A 13-month gap is not a technicality. Not paying the fees
is not a technicality. These are all separate material flaws resulting in unpermitted occupation of
public right-of-way by a corporation, based on a permit issued to a sheriff tasked with enforcing
the county ordinance that makes it a crime.</p>
<h2>The Order in “Law &amp; Order”</h2>
<p>The county does not know, from its own records, which cameras needed permits. It has no mechanism to
determine which cameras are on county roads, which are on state highways, and which are on someone
else’s property.</p>
<p>The Director of Transportation issued permits to the Sheriff, who had never applied for any, without
the required public interest finding, and without traffic control plans for all but one
installation. When the second permit expired, no one acted. When a replacement was finally applied
for thirteen months later it was with the same application — literally the same file — Flock had
used for the prior permit. The new permit was also issued to the Sheriff.</p>
<p>That permit process was handled by a Permitting Manager at Flock with over a decade of experience in
right-of-way permitting. None of these issues were discovered when processing the permits or through
any audit or investigation in three years. Neither Flock’s permit expert, the Sheriff’s Department,
nor the Transportation Department raised a flag.</p>
<p>That process — namedrop Chad Bianco, skip the fees, ignore the regulations — is the law and order he
now offers California.</p>
<div class="text-sm mt-8 border-t p-2 text-secondary">
Update Mar 30, 2026: Riverside County was asked to comment, but did not provide a response.<br>
Update Mar 31, 2026: Updated title to reflect Bianco's position.<br>
</div>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>There was also a smaller, ~2.5 month, gap between the first and second permits. That
could arguably still fall under the category of “minor administrative hiccup.” <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>M12 refers to “temporary poles and cable.” Whether that applies to Flock’s permanent
camera poles or only to construction-related temporary equipment is arguable. The first permit
(ENC21120546) used different language — removal “upon the request of the <abbr class="md-tooltip" data-tooltip="Riverside County Transportation Department">RCTD</abbr>” — which is
discretionary. But ENC23110539 changed the trigger to “upon expiration,” making it automatic.
Even if M12 does not apply to Flock’s poles, both the permits’ own scope of work (“install,
operate and maintain”) and Section 6 of Ordinance 499 independently prohibit operating or
maintaining any structure in the right-of-way without a valid permit. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>contract-procurement</category>
        </item>
        <item>
            <title><![CDATA[Trust Me, Bro: Flock's Latest Security Blog, Reviewed]]></title>
            <link>https://footnote4a.org/news/trust-me-bro</link>
            <guid isPermaLink="false">https://footnote4a.org/news/trust-me-bro</guid>
            <pubDate>Sun, 29 Mar 2026 01:50:00 GMT</pubDate>
            <description><![CDATA[Flock Safety's new CISO published a blog post defending the company's cybersecurity record. It relies on misquoted opponents, vibe-based severity ratings, and a conspicuous absence of actual evidence.]]></description>
            <content:encoded><![CDATA[<p>Flock’s new <abbr class="md-tooltip" data-tooltip="Chief Information Security Officer">CISO</abbr> posted another blog post — his second, I believe.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> The first was regarding
the Bishop Fox audit, which was <a href="bishop-fox">discussed here</a>. His latest post is “<a href="https://archive.vn/wip/zlPs5">Flock Safety
Cybersecurity: How We Protect Customer &amp; Community Data</a>.” In it, he presents a cavalcade of
falsehoods and omissions that could not have been better hallucinated if ChatGPT had written it, with
some casual defamation tossed in for good measure.</p>
<h2>The Timeline, According to Flock</h2>
<p>The timeline begins with an “External Claim” in March 2025, where “an individual contacted Flock
with security findings after acquiring a device through illegal, unauthorized means.” Presumably,
this refers to <a href="https://gainsec.com/2025/11/05/formalizing-my-flock-safety-security-research/">Jon Gaines</a>’ research. A year later, Flock has not fixed those issues.</p>
<p>What it has done is reflected in the rest of the timeline: it “disclosed and addressed low-severity
vulnerabilities,” it “responded to” the research, and it “published a response debunking false
claims that the company had been hacked.”<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> None of that fixes the issues that were disclosed
to Flock in March.</p>
<p>The first of those actions, disclosure, happened in November, after Gaines published his report. Before
November, Flock had not disclosed the issue. Not even to its customers. This is despite the requirements
of the <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr> security policy, which require vendors to notify the government agency and the FBI.</p>
<p>The Iowa Department of Public Safety (a Flock customer and <abbr class="md-tooltip" data-tooltip="CJIS Systems Agency">CSA</abbr> for Iowa) confirmed it had received
no notification from Flock. Other CSAs — the Florida Department of Law Enforcement and the Illinois
State Police — did not respond to a Sunshine Act request, or asserted that vulnerability
notifications are “<abbr class="md-tooltip" data-tooltip="Automated License Plate Reader">ALPR</abbr> data.”</p>
<p>Despite a contractual and legal obligation to provide this notification to its customers, Flock did
not do so for eight months, and then only <em>after</em> its customers found out.</p>
<p>The timeline does not discuss a YouTube video before pivoting to a “second” one with “misleading
claims about Flock <abbr class="md-tooltip" data-tooltip="Pan-Tilt-Zoom">PTZ</abbr> cameras.” Flock’s timeline says it “addressed” those claims.</p>
<h2>“Misleading Claims,” According to Flock</h2>
<p>The “Readdressing Misleading Claims About Cybersecurity at Flock” is a lie. Not because its content
is false — although it’s not exactly true — but because it doesn’t even do anything resembling
addressing claims, like the section heading promises.</p>
<p>Can’t even trust a heading. Anyway …</p>
<blockquote>
<p>I want to be crystal clear: vulnerabilities are a part of the development process of hardware and
software. No company on the planet is infallible, nor is any company unhackable. It is an expected
and normal process for vulnerabilities to be discovered and remediated at each stage of software
development. From the point of a developer writing code all the way to that finished product
running in production.</p>
</blockquote>
<p>We engineer bridges and buildings so that they don’t collapse. We do all sorts of math and
engineering and further science so this doesn’t happen. But occasionally, and unfortunately, they
do collapse. When they collapse, we don’t shrug our shoulders and say “it’s part of the process.” We
investigate the cause and address it. We make meaningful, articulable improvements to our engineering
processes and standards.</p>
<p>We now have those collapses and their fixes codified in laws and regulations and we explain them in
engineering textbooks and use them as examples on powerpoints at industry conferences and seminars.
That is why we now have buildings and bridges that are more earthquake resistant than 100 years ago.</p>
<p>We don’t hide the problem. We don’t say it’s “an expected and normal process” for a bridge to collapse.</p>
<p>It’s an exceptional situation for a bridge to collapse, just as it’s an exceptional situation for a
software vulnerability to be discovered in production. And just as people have died from buildings
crumbling in earthquakes, <a href="https://www.pbs.org/newshour/world/iran-built-a-vast-camera-network-to-control-dissent-israel-used-it-to-track-targets-ap-sources-say">people have died from insecure surveillance networks</a>.</p>
<p>You don’t hide engineering issues — civil or software. You make them public, you address them, and
you learn from them.</p>
<p>But, despite claiming that discovering these issues in production is “expected and normal,”
Flock’s bulleted list of what to expect from a vendor does not include it.</p>
<p>The list does not mention notification or remediation for production issues. No timelines, no
categories, no mentions of public vulnerability trackers, no issue categories, or anything else. Not
even a “We will notify our customers and provide a remediation plan within 48 hours” or anything
similar.</p>
<h2>Flock’s Cybersecurity Team</h2>
<blockquote>
<p>Flock continues to invest in our team and has 10 new headcount positions slated for hiring this
year, adding to our existing team of 20+ engineers. Cybersecurity is nothing without people.</p>
</blockquote>
<p>This is the exact opposite of what Flock should be doing. Instead of hiring more engineers to
develop more <a href="freeform-freeforall">buggy AI-powered features</a> and release <a href="trust-center">more half-finished
websites</a>, Flock should be investing in hiring policy and security experts.</p>
<p>The post then lays out some team names without defining their headcounts, budgets, or positions in
the organization hierarchy. In some companies, a 50-person “DevSecOps” team is focused on security
and can shut down production when needed; in others, it’s literally one guy in Mexico City writing
scripts so developers can automatically release code without review.</p>
<p>Castaldo does not even hint at where Flock might fall on that spectrum, and that’s cause for concern.</p>
<h2>The “First” video</h2>
<p>Although Castaldo omits the November video — which was Benn Jordan working with Jon Gaines — from
the timeline, he devotes a section of the post to it.</p>
<blockquote>
<p>In November 2025, a YouTuber released a YouTube video with two other individuals claiming to have
“hacked 80,000 Flock cameras”. That statement tells you all you need to know about the credibility
of the individuals and the video itself.</p>
</blockquote>
<p>The video is titled “We Hacked Flock Safety Cameras in under 30 Seconds.” The closest thing to
Castaldo’s quote is: “Upon further investigation, it turns out that there are over 80,000 of them.
And um we got some and we hacked them.” Which is 100% true.</p>
<p>Blatantly misquoting an opponent’s statement before attacking it tells you all you need to know
about the credibility of that individual.</p>
<p>Castaldo uses some choice words like “illicitly,” and “illegally” to characterize the acquisition of
the Flock hardware. There is nothing “illegal” about buying hardware, and absolutely nothing
suggests that Gaines (or whoever bought the hardware) did so illegally. Falsely accusing someone of
criminal conduct is defamation per se in most jurisdictions.</p>
<p>Flock did not disclose these issues to customers. Flock did not notify customers in accordance with
industry best practices and according to <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr> standards. Flock did not close out any <abbr class="md-tooltip" data-tooltip="Common Vulnerabilities and Exposures">CVEs</abbr>, nor did
it open any new ones. Flock did not tell Jon Gaines “we are aware of this and we will fix it.” And
at no time in 2025 (or at all, for that matter) did Flock communicate a fix.</p>
<blockquote>
<p>While the findings were legitimate, they were all of low severity. Meaning the risk to customers
or customer data was near zero.</p>
</blockquote>
<p>Of the findings in the report, many are high severity when going by the framework laid out by the
U.S. Department of Justice, which governs much of the data. Castaldo does not specify what framework
he uses for his “low severity” classification or his “near zero” risk assessment.</p>
<p>Dunwoody gave us <a href="the-platform">vibes-based auditing and compliance</a>, Castaldo adds another layer:
vibe-based cybersecurity.</p>
<blockquote>
<p>Had this individual not prevented [the camera] from connecting to our cloud, most of their
findings would have been moot.</p>
</blockquote>
<p>This is a fair enough statement in isolation, but does not address the two key problems.</p>
<p>First, there is no evidence that Flock discovered and fixed these issues, and rolled out an update.
No required customer notifications, no proactive security disclosures, nothing. Complete silence.</p>
<p>If these issues were indeed fixed, and were not the result of plain negligence, nothing is lost by
publishing these issues. Most software vendors do exactly that to build trust. Microsoft, for
example, has a page called “<a href="https://www.microsoft.com/en-us/security/blog/threat-intelligence/vulnerabilities-and-exploits/">Vulnerabilities and Exploits</a>” on its main website, and it includes
a list of fixes with each update, including any security fixes.</p>
<p>If Flock had published anything or notified anyone, cross-referencing those notifications against
Jon Gaines’ report would make for an easy exercise in ticking off fixed issues and seeing what — if
anything — remains.</p>
<p>Flock could easily restore trust and show that it is on top of its security by publishing a few
emails that it already sent to its customers when it first discovered these issues — as it is
required to do — or when it fixed the issues — as is standard practice.</p>
<p>Second, there have been no patches for this particular operating system since 2021. While security
issues could have been deployed for Flock’s custom software, no vendor OS fixes were released.</p>
<p>Connecting it to the network would not have caused non-existent patches to be applied.</p>
<h2>The “Second” video</h2>
<blockquote>
<p>This individual did not ethically submit any information to Flock prior to the release of their video</p>
</blockquote>
<p>If I’m recalling the video correctly, it is true Jordan did not submit information to Flock prior to
the release of the video. The last time issues were disclosed to Flock — in March, according to the
timeline — they were not fixed or disclosed even months later (or, to this day, as far as I’m
aware). Disclosure to a vendor is <em>often</em> the right choice, but there are no bright lines in ethics.</p>
<p>In this case, anyone whose ethics dictate minimization of harm would have done exactly what Jordan
did. He denied Flock a second opportunity to jeopardize people’s safety by trying to bury an issue,
as they did when issues were disclosed to them in March.</p>
<h3>Just Keep Digging</h3>
<blockquote>
<p>Flock worked with our carrier partner to quickly resolve the network configuration issue. …
Flock has also modified the diagnostic interface to require our technicians to log in with a
username and password. Again, this interface is intended to be usable when a technician is
physically present.</p>
</blockquote>
<p>First, let’s address that the software had to be “modified” to require a username and password.</p>
<p>According to Castaldo’s post, Flock did all of these things:</p>
<ul>
<li>“Threat modeling during the design phase of a product”</li>
<li>“Scanning and fixing code as the developer is writing it”</li>
<li>“Scanning and fixing finished code when a developer submits it to the code repository”</li>
<li>“Scanning and fixing applications running in production”</li>
<li>“Continuously scanning and monitoring the infrastructure the application is running in”</li>
<li>“Conducting penetration tests against all of the above.”</li>
</ul>
<p>To top it off, he writes immediately below that list: “There is a cliche about cybersecurity being
an onion with many layers, and that remains accurate today.”</p>
<p>Yet, in that whole development process, nobody at Flock, at any time, said: “hey, maybe we should
require a username and password.” Even hardcoding “DonkeyKeepOut!” as a password would have
prevented Jordan from gaining access.</p>
<p>The second issue is that no matter what layers Flock might have in its development process, there
was only one in its security: Verizon’s configuration. In this, Flock’s security model is more like
banana: a single layer that can easily be peeled away by anyone who wants access.</p>
<p>Flock gave Verizon the unchecked, unreviewed, unsupervised, ability to create and manage the
security configuration for an interface that was not secured with a password.</p>
<p>Even without a “misconfiguration,” Verizon employees would have had access. A company with roughly
as many employees as Burbank, CA has residents (plus who knows how many contractors) having
unfettered access to live videos of kids playing in parks is Castaldo’s baseline definition of
secure.</p>
<h2>On Android</h2>
<p>The software on Flock’s cameras hasn’t received vendor security updates since 2021. That is the
central fact of this section of Castaldo’s post, and the one he does not address. Instead, he offers
several paragraphs of technically misleading context about chip architectures — context that, on
examination, actually makes his position worse.</p>
<blockquote>
<p>Flock hardware runs on a heavily modified version of the Android operating system maintained by
Google. This is an open-source operating system, meaning anyone in the world can look at the code
and use it.</p>
</blockquote>
<p>Flock has “heavily modified” Android, but never published those modifications. Yet we should feel
assured — presumably based on vibes — that its “heavy modifications” are not material enough to
affect security.</p>
<blockquote>
<p>This is very different from the CPU in a computer running Windows or MacOS. Qualcomm’s chipsets
are purpose-built and support specific operating system versions.</p>
</blockquote>
<p>This is somewhat backwards, because hardware vendors don’t tend to build chips to accommodate
operating systems, but it’s accurate enough in the way it matters: there is a fixed relationship
between the hardware and the OS.</p>
<p>Flock Falcons reportedly use Qualcomm Snapdragon 625 chips, which are early 64-bit ARM chips (like
the M1/M2 chips in current Macs). These were supported by Android until version 8.0 or 8.1, support
for which ended in 2021. This is the same as support for older Intel-based Macbooks, which is also
ending. There is nothing particularly unique or different about Qualcomm chips in that regard.</p>
<p>It’s theoretically possible that for the past five years, Flock has been paying engineers to
backport security fixes to this unsupported version of Android. There are projects like LineageOS
that do exactly this to support aging phones in primarily low-income countries.</p>
<p>It’s also theoretically possible that Flock designed the Falcon around 2017 around the then-popular
Snapdragon 625, and that it did not replace all of its devices in 2021 when supported ended, but
instead designed an entirely new line of devices (which it called “Flock <abbr class="md-tooltip" data-tooltip="License Plate Reader">LPR</abbr>”), with the goal of
replacing the Snapdragon 625-based Falcons as they age out of service.</p>
<blockquote>
<p>Qualcomm produces a custom, heavily modified version of Google Android that is designed to run on
their chipsets.</p>
</blockquote>
<p>Qualcomm <em>does</em> produce a modified Android that is optimized for its hardware, this much is true.
The problem is that Qualcomm takes an official Google Android version and modifies it for its
hardware.</p>
<p>Qualcomm released its last full <abbr class="md-tooltip" data-tooltip="Board Support Package">BSP</abbr> for the Snapdragon 625 in 2019, and its last security update in
Q4 of 2020.</p>
<h3>Android Things</h3>
<p>Gaines’ security report finds a problem in “Android Things 8.1” being <abbr class="md-tooltip" data-tooltip="End of Life">EOL</abbr>. Android Things was a
popular OS for the Snapdragon 625. In the blog post, Castaldo emphatically bolds that “Flock has
never used Android Things, in any product.”</p>
<p>Never mind that it contradicts the earlier “all of the findings were previously discovered by
Flock’s cybersecurity team,” or that this is the first time Flock has raised the point, the
distinction between “Android Things 8.1” or “Android 8.1” is irrelevant.</p>
<p>Because “Qualcomm’s chipsets are purpose-built and support specific operating system
versions,”<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup> none of those “specific operating system versions” have been supported since
2021. Not Android 8.1, not Qualcomm’s BSPs, not Android Things 8.1.</p>
<p>Even if the statement were true — which I doubt, because I trust Gaines and Jordan to be able to
identify an OS — it would be a nice “gotcha” on an entirely meaningless fact.</p>
<p>At the end of the day, the software hasn’t received security updates since 2021. That’s the point
that matters, and the one Castaldo does not address.</p>
<h3>Backporting</h3>
<blockquote>
<p>We will continue to backport any necessary security patches, as required under our agreements with
all customers.</p>
</blockquote>
<p>If Flock is indeed backporting security patches to Android (Things) 8.0 or 8.1, or whatever
the case may be, then security itself may not be the issue. However, “as required under our
agreements with all customers” includes the requirement to notify customers when they do discover
security vulnerabilities.</p>
<p>Each time Flock backports a fix, its contracts — at least those with <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr> security addenda, which
should be all government contracts — require notifications to be sent to contracting agencies (and
the FBI). No notifications have ever been sent out.</p>
<p>The other problem is that Qualcomm’s proprietary modifications to Android, which Flock just
explained are tied to the hardware, are not open source at all. There is no backporting fixes to
those parts of the OS.</p>
<h2>Third party attestation</h2>
<blockquote>
<p>Yes, Flock has qualified third-party attestations of its cybersecurity. What you should also
expect from your vendors is continuous audits by qualified, third-party firms. Flock takes this
seriously and goes far beyond surface-level audits.</p>
</blockquote>
<p>The post rattles off a list of security standards or frameworks, this time omitting <a href="never-hacked-facts"><abbr class="md-tooltip" data-tooltip="Higher Education Community Vendor Assessment Toolkit">HECVAT</abbr> and
<abbr class="md-tooltip" data-tooltip="Family Educational Rights and Privacy Act">FERPA</abbr></a>, and points to its “trust center” where, “[o]nce you gain authorization
for access, you may review” the relevant documents.</p>
<p>But you don’t need access to see that the list of actual certifications — SOC2 Type II, ISO 27001,
ISO 27017, etc. — are about organizational and procedural controls, not software vulnerabilities.</p>
<p>Flock “maintains standards” of “<abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr> Insights”, “<abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr> ACE”, “<abbr class="md-tooltip" data-tooltip="Federal Risk and Authorization Management Program">FedRAMP</abbr> 20x,” and “<abbr class="md-tooltip" data-tooltip="National Defense Authorization Act">NDAA</abbr>”. “<abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr>
Insight” (singular — Flock can’t even get the product name right) is a compliance-tracking software
dashboard sold by Diverse Computing, a company in Tallahassee, Florida. “<abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr> ACE” is a commercial
compliance assessment also sold by Diverse Computing. Neither is a government certification, and
neither is affiliated with the <abbr class="md-tooltip" data-tooltip="Department of Justice">DOJ</abbr> or the FBI.</p>
<p>This is where it gets really interesting and where we have to break out our diamond pickaxes.</p>
<p>Castaldo spent most of this post assuring us that their use of an outdated operating system is fine
because they backport software. Now he invokes <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr> and <abbr class="md-tooltip" data-tooltip="National Defense Authorization Act">NDAA</abbr>.</p>
<p><abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr> requires the use of <abbr class="md-tooltip" data-tooltip="Federal Information Processing Standards">FIPS</abbr>-140 validated encryption modules. <abbr class="md-tooltip" data-tooltip="Federal Risk and Authorization Management Program">FedRAMP</abbr> — which Flock also claims
and which was codified into law by the <abbr class="md-tooltip" data-tooltip="National Defense Authorization Act">NDAA</abbr> — independently requires <abbr class="md-tooltip" data-tooltip="Federal Information Processing Standards">FIPS</abbr>-140 validation as well.
To the extent Flock has <abbr class="md-tooltip" data-tooltip="Federal Information Processing Standards">FIPS</abbr>-140-2 validation, it has never produced documentation to my knowledge.
Soon — in September 2026 — <abbr class="md-tooltip" data-tooltip="Federal Information Processing Standards">FIPS</abbr> 140-2 will be no more. Flock will need to move to <abbr class="md-tooltip" data-tooltip="Federal Information Processing Standards">FIPS</abbr>-140-3.</p>
<p><abbr class="md-tooltip" data-tooltip="Federal Information Processing Standards">FIPS</abbr>-140-3 places stricter standards on the “Operational Environment,” which includes the operating
system: Flock will have to validate the combination of obsolete hardware (Snapdragon 625) and custom
operating system as a single “hybrid module.” So far, such a hybrid module does not show up in
<a href="https://csrc.nist.gov/projects/cryptographic-module-validation-program/validated-modules/search?SearchMode=Basic&amp;Vendor=Flock&amp;CertificateStatus=Active&amp;ValidationYear=0"><abbr class="md-tooltip" data-tooltip="National Institute of Standards and Technology">NIST</abbr>’s database</a>.</p>
<p>As <a href="bishop-fox">previously reported</a>, Castaldo’s co-founder at “Security Tinkerers,” Will Lin, sits
on the board of Bishop Fox — the firm Flock hired for its security audit. Castaldo mentions Bishop
Fox only once in passing in this post, and does not mention this relationship at all in the section
about third-party verification.</p>
<h2>The Proof</h2>
<p>I have called for this before, and I will call for it again: Flock should publish its actual <abbr class="md-tooltip" data-tooltip="National Institute of Standards and Technology">NIST</abbr>
validation certificates, and its security disclosures to its customers.</p>
<p>Castaldo’s 2,000-word defense does not contain a single customer notification, a single <abbr class="md-tooltip" data-tooltip="Common Vulnerabilities and Exposures">CVE</abbr>, or a
single <abbr class="md-tooltip" data-tooltip="National Institute of Standards and Technology">NIST</abbr> certificate number. It relies on strawmen arguments, mischaracterizations of hardware
lifecycles, and a little light defamation.</p>
<p>Stop digging and start fixing.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Not counting “Why I Joined Flock Safety: A Mission You Can Feel” <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>This one probably refers to the <a href="colwell-files">December emails</a>, where Flock had to tell
cops that the information on this website is from public records, not hacks. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>The statement is incorrect, but the fixed relationship between chip and OS is real. How
that relationship is created is irrelevant. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>foia-transparency</category>
        </item>
        <item>
            <title><![CDATA["Flock Wing License(s) Included": How Speed Cameras Became Surveillance Cameras]]></title>
            <link>https://footnote4a.org/news/speed-cameras</link>
            <guid isPermaLink="false">https://footnote4a.org/news/speed-cameras</guid>
            <pubDate>Fri, 27 Mar 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[Procurement records reveal how Flock Safety sneaks its cameras into school zones with zero data governance provisions in the contract.]]></description>
            <content:encoded><![CDATA[<p>In Florida, every time a parent drops off a child at a Hillsborough County school zone, RedSpeed
cameras capture continuous HD video of their vehicle. The footage is fed, via <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> stream, directly
into Flock Safety’s national surveillance network where it is processed by Flock’s AI, stored on
Flock’s terms, and made searchable by thousands of agencies nationwide.</p>
<p>The contract governing this arrangement contains no data retention policy for the surveillance
layer, no restrictions on who can access it, no privacy provisions for the people being filmed, and
not even a reference to Flock’s terms of service. The word “privacy” does not appear — except once,
regarding credit card processing when subjects pay for the privilege of their surveillance.</p>
<p>The pricing page of RedSpeed’s winning proposal says it plainly: <strong>“Flock Wing License(s)
Included.”</strong></p>
<p><img src="https://footnote4a.org/blog/speed-cameras/proposal-pricing.png" alt="RedSpeed pricing page — &quot;Flock Wing License(s)&quot;"></p>
<h2>What Hillsborough County Bought</h2>
<p>In 2024, the Hillsborough County Sheriff’s Office solicited proposals for automated speed
enforcement in school zones (RFP 2024-003). RedSpeed Florida won the contract. Its 80-page proposal
made the Flock integration central to its pitch.</p>
<p>On page 5, a letter on Flock Safety letterhead, signed by Todd Troutman, Senior Accounts, confirms
the partnership:</p>
<blockquote>
<p>Flock Safety and Redspeed have partnered together to support many different agencies. Flock Safety
is able to provide an additional layer of software to the Redspeed cameras (speed and red light).
This allows the Redspeed cameras to be turned into ALPRs that push images into Flock Safety’s
cloud and allow agencies with access to those cameras to search for vehicles.</p>
<p>…</p>
<p>In order for the two systems to work together, Redspeed will provide Flock with <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> streams for
the given cameras. From there, Flock Safety will integrate the camera stream into the Flock system
thus allowing the software to be on the camera, turning it into an ALPR. The camera is then
plotted on the Flock Safety map in the application to appropriately locate where the cameras are.</p>
<p>…</p>
<p>As of March 2024, Redspeed is the only company with whom Flock has partnered with to offer Wing
LPR integration on school zone enforcement and/or red light cameras.</p>
</blockquote>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/flock-letter-to-redspeed.pdf" class="collapsible">Flock Safety Letter to RedSpeed (from HCSO RFP 2024-003)</a></p>
<p>RedSpeed’s transmittal letter was even more direct:</p>
<blockquote>
<p><strong>ONLY RedSpeed can offer integration with Flock.</strong> We have enclosed a letter from Flock
confirming this fact. We have collaborated closely with Flock to optimize interoperability… We
have <strong>successfully integrated over 100 Flock systems</strong> in current installations; our competitors
have integrated zero Flock systems. Only RedSpeed offers this direct integration, and <strong>Flock is
included in the RedSpeed price. Integrated Flock means RedSpeed’s cameras are feeding the Wing
System for enforcement synergy.</strong> It also means fewer poles and solar panels.</p>
</blockquote>
<p>Enforcement. Synergy.</p>
<p><img src="https://footnote4a.org/blog/speed-cameras/proposal-flock-claims.png" alt="RedSpeed transmittal — Flock integration claims" class="collapsible"></p>
<p>RedSpeed’s proposal includes a competitive comparison table highlighting “True integration with
Rekor/Flock/Vigilant” as a checkmark for RedSpeed and a red “denied” for “All Competitors.”</p>
<p><img src="https://footnote4a.org/blog/speed-cameras/proposal-table1.png" alt="RedSpeed Table 1 — competitive comparison"></p>
<p>The proposal emphasizes that RedSpeed cameras deliver “lane-specific, high resolution (3000x5000
pixels, 30 frames per second), video cameras” — and that RedSpeed “provides the ability to live
stream video from all cameras (no still cameras).” It also states that RedSpeed “provides at least
45 days of storage” and “Flock ALPR at all locations, included in the RedSpeed Price.”</p>
<p><img src="https://footnote4a.org/blog/speed-cameras/proposal-camera-tech.png" alt="RedSpeed camera technology section" class="collapsible">
<img src="https://footnote4a.org/blog/speed-cameras/proposal-approach.png" alt="RedSpeed understanding and approach summary" class="collapsible"></p>
<p>RedSpeed’s stake in all this is straightforward. It offers a “turnkey” service — everything from
taking a picture to swiping a credit card — for “35% of the Governing Body’s Statutory share of
collected revenue.” In Hillsborough County alone, more than 105,000 violations have been issued
since fall 2024, generating over $6 million in paid fines; <a href="https://www.wptv.com/wptv-investigates/florida-school-speed-zone-cameras-ripping-drivers-off-says-county-magistrate-who-ruled-on-hundreds-of-cases">a local magistrate called it a rip-off</a>.</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/redspeed-proposal-hcso.pdf" class="collapsible">RedSpeed Full Proposal — HCSO RFP 2024-003 (80 pages)</a></p>
<p><img src="https://footnote4a.org/blog/speed-cameras/proposal-pricing-letter.png" alt="Flock letter placement after pricing section"></p>
<p>In Alpharetta, GA, it was structured a little different: the county <a href="https://patch.com/georgia/alpharetta/speed-detection-cameras-approved-alpharetta-school-zones">had to pay 2% extra to give the
data to
Flock</a>.
Maybe that’s Georgia-based Flock’s home field advantage at play.</p>
<h2>The Silent Contract</h2>
<p>What matters most about the Hillsborough procurement is what the contract <em>doesn’t</em> say.</p>
<p>The HCSO-RedSpeed contract consists of three incorporated documents:</p>
<ol>
<li>The RFP solicitation (HCSO RFP 2024-003, 39 pages)</li>
<li>The draft contract template (11 pages)</li>
<li>RedSpeed’s proposal (80 pages, including the Flock letter)</li>
</ol>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/hcso-rfp-2024-003.pdf" class="collapsible">HCSO RFP 2024-003 — Final Solicitation</a>
@<a href="https://footnote4a.org/blog/speed-cameras/hcso-draft-contract.pdf" class="collapsible">HCSO RFP 2024-003 — Draft Contract</a></p>
<h3>The Request for Proposals</h3>
<p>The RFP explicitly required ALPR capability (Part D, Section 3):</p>
<blockquote>
<p>Qualified, proposing firms must demonstrate competence and experience with Automated Speed
Enforcement Systems and Automated License Plate Reader systems</p>
</blockquote>
<p>It required video, not stills (Part C, Section 3.A):</p>
<blockquote>
<p><strong>Video Technology is required. Still shots are not acceptable.</strong> Respondent proposer must utilize
radar and/or laser automated speed detection systems.</p>
</blockquote>
<p>And it required subcontractor disclosure (Part B, Section 5):</p>
<blockquote>
<p>If a Proposer intends to use subcontractors, the Proposer must <strong>identify in the Proposal the
names of the subcontractors and the portions of the work</strong> the subcontractors will perform.</p>
</blockquote>
<p><img src="https://footnote4a.org/blog/speed-cameras/rfp-alpr-requirement.png" alt="RFP Part D — ALPR requirement" class="collapsible">
<img src="https://footnote4a.org/blog/speed-cameras/rfp-video-required.png" alt="RFP Part C — Video required, stills not acceptable" class="collapsible">
<img src="https://footnote4a.org/blog/speed-cameras/rfp-subcontracting.png" alt="RFP Part B — Subcontractor disclosure requirement" class="collapsible"></p>
<p>What was not in the RFP were any specifications for how ALPR data should be governed, stored,
retained, shared, or deleted.</p>
<h3>What the draft contract covers</h3>
<p>The draft contract is an 11-page template with fill-in-the-blank fields. It covers: term (3 years +
three 1-year extensions), insurance requirements, E-Verify compliance, subcontracting (generic),
public records obligations (per Florida § 119.0701), indemnification, and confidentiality — but
only of “Sheriff Operations” (Section 23).</p>
<h3>What the draft contract does NOT cover</h3>
<ul>
<li>Data retention for ALPR/LPR captures</li>
<li>Data sharing restrictions (who can access Flock’s system)</li>
<li>Privacy policy for citizens whose vehicles are scanned</li>
<li>Flock Safety’s terms of service or Master Service Agreement</li>
<li>Any reference to Flock’s default data practices (30-day rolling delete, Section 4.3 perpetual
anonymized data license, Section 5.3 law enforcement disclosure rights)</li>
<li>Ownership of ALPR data (distinct from violation/citation data)</li>
<li>Audit rights over the ALPR system</li>
<li>Restrictions on out-of-state or federal agency access</li>
<li>Any framework governing the surveillance layer at all</li>
</ul>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/flock-default-msa-oakland.pdf" class="collapsible">Flock Default MSA — Oakland CA, Sept 2025</a></p>
<p>Nothing in the contract says HCSO gets any rights to the video or the ALPR data. If HCSO wants to
access that, they presumably have to do what anyone else can do: pay Flock and <a href="own-nothing">ask
nicely</a>.</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/sfist-sfpd-flock-federal.pdf" class="collapsible">SFist — SFPD Flock Data Accessed 1.6M Times by Federal Agencies</a>
@<a href="https://footnote4a.org/blog/speed-cameras/aclu-flock-data-sharing.pdf" class="collapsible">ACLU — Flock Can Share Data Even When PDs Opt Out</a></p>
<p>The sheriff’s RFP was specific enough to guarantee the desired outcome. The final tabulation sheet
published by HCSO shows RedSpeed with the highest evaluation score of 95.95, ahead of Blue Line
Solutions (91.75) and Conduent (77.6).</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/hcso-tabulation-sheet.pdf" class="collapsible">HCSO RFP 2024-003 — Tabulation Sheet</a>
@<a href="https://footnote4a.org/blog/speed-cameras/cl-tampa-flock-speed-cameras.pdf" class="collapsible">Creative Loafing Tampa — Flock Integrated Speed Cameras in School Zones</a></p>
<h2>Wing: The Platform That Turns Any Camera Into a Flock Camera</h2>
<p>RedSpeed’s pitch works because of Wing: Flock’s product line for converting third-party cameras into
Flock surveillance nodes. The branding is a somewhat confusing patchwork of overlapping names, and
Flock has removed several of its Wing-related pages from its website, but the product is still sold
and deployed.</p>
<h3>The Pitch</h3>
<p>In October 2020, Flock Safety announced Wing with a press release headline that said, plainly:</p>
<blockquote>
<p><strong>FLOCK SAFETY ANNOUNCES THE WING INTEGRATION TO DISTILL 1000s OF HOURS OF IP CAMERA FOOTAGE INTO
SEARCHABLE IMAGES THAT SOLVE CRIME</strong></p>
</blockquote>
<p>The subhead: “Software transforms existing IP cameras into cameras that can see like a detective”</p>
<p>Wing takes video from existing cameras — IP cameras, security cameras, traffic cameras — and runs
Flock’s AI on it, letting users search for white sedans,
<a href="the-platform">unicycles</a>, or <a href="freeform-freeforall">people wearing jeans</a>.</p>
<p>Cameras connect via standard <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> (Realtime Streaming Protocol), a camera standard that’s supported
by many commercial surveillance cameras as well as consumer products like
<a href="https://amcrest.com/4mp-wifi-camera-doorbell-ad410.html">doorbells</a> and <a href="https://us.store.tapo.com/collections/best-selling-products/products/tapo-c120-indoor-outdoor-wired-security-camera">$35 surveillance
cameras</a>.</p>
<h3>The Wing Ecosystem</h3>
<p>In an August 2025 OMNIA Partners cooperative purchasing pricelist, Wing LPR is listed as: <strong>Flock
Safety Wing™ LPR</strong> (<code>wing_integration</code>, $3,000/yr per camera): “Video software integration
transforms traditional IP cameras into Flock Safety enabled LPR cameras. Includes Vehicle
Fingerprint™ computer vision and Advanced Search Package (Convoy Analysis, Multi Geo Search, Visual
Search)”</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/omnia-flock-pricing-aug-2025.pdf" class="collapsible">OMNIA Partners — Flock Pricing, Aug 2025</a></p>
<p>The same catalog lists the Wing product family: Wing Livestream ($500/yr), Wing Replay ($1,000/yr
with 7-day footage retention), Wing Gateway 2.0 (8–32 stream hardware at $3,650–$8,250 + subscription),
Wing Cloud Live Only ($90/yr), and an Inbound Vehicle Images API ($1,500–$2,500/yr) for ingesting
pre-processed plate reads from third-party LPR systems.</p>
<p>The “Wing Livestream” product price matches the $500 feature that turns Flock’s LPR into live video
surveillance — that’s “something you can take advantage of without going to council,” according to
Flock Safety’s Kevin Cutler.</p>
<div class="grid grid-cols-2 items-center gap-x-2">
  <img src="https://footnote4a.org/blog/speed-cameras/park-lpr.jpeg" alt="Set of Flock LPR cameras facing basketball and pickleball courts">
  <img src="https://footnote4a.org/blog/speed-cameras/wing-live.webp" alt="Live video without approval">
</div>
<p>Flock misleadingly tells the public it sells “LPR” cameras — a product name, not a description —
while it <a href="the-platform">consolidates its network into a single searchable database</a>.</p>
<p>The network from that <a href="https://www.bbc.com/news/articles/cwy8dxz1g7zo">Superbowl Ring commercial</a>,
promising to find your dog is already deployed nationwide on speed cameras, parking enforcement
cameras, and “CCTV” sytems on your basketball and pickleball courts.</p>
<h3>Wing in Practice</h3>
<p>On June 27, 2025, Flock published a blog post titled <em>“Video Without Limitations: Flock Safety’s
Newest Solutions for Law Enforcement”</em> showcasing Wing Gateway 2.0 and Wing Gateway Outdoor.</p>
<p>@v<a href="https://footnote4a.org/blog/speed-cameras/wing-webinar-segment.mp4">Flock Safety — Video Without Limitations Webinar (Wing segment, 13:36–end)</a>
@<a href="https://footnote4a.org/blog/speed-cameras/flock-blog-video-without-limitations.pdf" class="collapsible">Flock Blog — Video Without Limitations</a></p>
<p>In the October 2024 webinar (<a href="https://footnote4a.org/blog/speed-cameras/full-webinar.mp4">full video</a>), Trevor
Pennypacker, Sr. Product Manager at Flock, is excited to tell Flock’s customers that you can connect
“parking lots, restaurants, traffic cameras, really anything.”</p>
<p>The City of Bloomington, IL executed an agreement that explicitly includes Wing LPR in its order
form:</p>
<ul>
<li>“Flock Safety Wing™ LPR — Included — 10 Included”</li>
<li>“Flock Safety Wing™ <abbr class="md-tooltip" data-tooltip="Video Management System">VMS</abbr> — Included — 100 Included”</li>
<li>“Professional Services — Wing Implementation Fee — $500.00”</li>
</ul>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/bloomington-wing-lpr-pages.pdf" class="collapsible">Bloomington IL — Wing LPR Relevant Pages (9 pages)</a></p>
<p>The branding, boundaries, and availability of Wing products is all somewhat shifting and murky —
from Wing Gateway 2.0 to Wing Cloud to Wing LPR — but the core functionality is what matters:
third-party cameras are being turned into Flock nodes, and Flock actively markets and sells that
functionality.</p>
<h2>The Scan-Everything Architecture</h2>
<p>RedSpeed’s cameras are always on during enforcement hours. They capture continuous HD video of every
vehicle passing through the field of view — in a school zone, recording parents, teachers, students,
buses, and anyone else on the road. “Video Technology is required. Still shots are not acceptable.”</p>
<p>The <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> stream — all of it, not just violators — is fed to Flock. The Flock letter confirms this is
by design: the cameras are “turned into ALPRs that push images into Flock Safety’s cloud and allow
agencies with access to those cameras <strong>to search for vehicles.</strong>” Since then, Flock rolled out
FreeForm, its AI-powered search capability that can find people by
physical description: “man in blue shirt and cowboy hat,” “dressed in all black clothing and black
face mask,” or — as one Dunwoody PD officer tried — “GRINCH.”</p>
<h3>Vehicle Fingerprint</h3>
<p>The Vehicle Fingerprint technology alone extracts far more than license plates: plate number and
state registration, vehicle make, model, color, and body type, missing or covered plates, bumper
stickers and decals, roof racks, bike racks, trailer hitches, and aftermarket wheels.</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/flock-vehicle-fingerprint.pdf" class="collapsible">Flock Blog — Vehicle Fingerprint: When Plate Data Fails</a></p>
<p>But that’s only part of the picture. Flock CEO Garrett Langley <a href="https://footnote4a.org/blog/speed-cameras/denver-update.pdf">has previously stated that the
system indexes <em>everything</em></a>, filtering only problematic
<em>searches</em> — or <a href="freeform-freeforall">attempting to filter them</a>, anyway.</p>
<p><img src="https://footnote4a.org/blog/speed-cameras/denver-legal.png" alt="Software recognizes everything" width="500"></p>
<h3>Where that data goes</h3>
<p>No matter how you feel about red-light or speed cameras as a policy matter, it is hard to justify
turning a safety measure for school zones into a surveillance dragnet whose recordings are fed
to a private corporation with no contractual restrictions on use. In San Francisco, SFPD’s Flock
cameras were searched 1.6 million times by out-of-state and federal agencies — in apparent violation
of California law. EFF’s analysis of 12 million Flock searches nationwide found hundreds related to
protest activity, immigration enforcement, and discriminatory targeting. A Norfolk, Virginia resident
sued after learning Flock cameras had logged his location 526 times in four months.</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/sfist-sfpd-flock-federal.pdf" class="collapsible">SFist — SFPD Flock Data Accessed 1.6M Times by Federal Agencies</a>
@<a href="https://footnote4a.org/blog/speed-cameras/aclu-flock-data-sharing.pdf" class="collapsible">ACLU — Flock Can Share Data Even When PDs Opt Out</a></p>
<h2>The Legal Tension</h2>
<h3>Florida’s prohibition on “remote surveillance”</h3>
<p>Florida law explicitly prohibits using school zone speed cameras for “remote surveillance” and
restricts the permitted uses of recorded footage:</p>
<blockquote>
<p>(15)(a) A speed detection system in a school zone may not be used for remote surveillance. The
collection of evidence by a speed detection system to enforce violations of ss. 316.1895 and
316.183, or user-controlled pan or tilt adjustments of speed detection system components, do not
constitute remote surveillance. Recorded video or photographs collected as part of a speed
detection system in a school zone may only be used to document violations of ss. 316.1895 and
316.183 and for purposes of determining criminal or civil liability for incidents captured by the
speed detection system incidental to the permissible use of the speed detection system.</p>
<p>(15)(b) Any recorded video or photograph obtained through the use of a speed detection system
must be destroyed within 90 days after the final disposition of the recorded event.</p>
<p>— Fla. Stat. § 316.1896(15)</p>
</blockquote>
<p>Two questions that nobody appears to have asked, let alone answered:</p>
<p>First, does feeding the full <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> stream to Flock — where it is processed by AI, matched against
vehicle databases, and made searchable by thousands of agencies for purposes wholly unrelated to
speed enforcement — constitute “remote surveillance” under the statute? The statute defines what is
<em>not</em> remote surveillance (evidence collection for speed violations, PTZ adjustments), but the
legislative history does not address third-party AI processing of the video feed.</p>
<p>Second, the statute requires destruction of recorded video within 90 days of final disposition, and
vendors must certify destruction annually. But once the <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> stream enters Flock’s system, it
is processed into Vehicle Fingerprint data, plate reads, and searchable metadata governed by Flock’s
own retention policies — not the county’s.</p>
<p>Altumint, a competing speed camera vendor in Florida, hinted at a loophole when it drew a
distinction explicitly. Its chief revenue officer <a href="https://www.alligator.org/article/2026/03/school-zone-speeding-cameras">told the <em>Independent Florida Alligator</em> in March
2026</a> that Altumint’s
cameras “only capture a license plate if the vehicle is speeding more than 10 miles over the speed
limit,” whereas RedSpeed’s Flock ALPR cameras “can document every license plate that passes by.” He
added: “Even in a school zone, you could be going 25 in a 15 … but I can’t capture that plate. ALPR
can capture that plate.”</p>
<p>Whether derivative data (plate reads, AI-extracted vehicle descriptions) qualifies as “recorded
video or photograph” under the statute is untested. The statute’s drafters were contemplating a
camera vendor that stores and deletes footage. They were not contemplating a speed camera sending
data to a second vendor that ingests the same stream in real time and converts it into a permanent
surveillance record.</p>
<p>No Florida court has addressed either question. No Attorney General opinion appears to exist. The
statute was enacted in 2023 (HB 657). Florida is one of RedSpeed’s biggest markets.</p>
<h2>What Flock Tells Everyone Else</h2>
<p>Across dozens of municipal FAQ pages and Transparency Portals, Flock provides standardized language:</p>
<blockquote>
<p>Flock Safety cameras are <strong>not used to enforce traffic violations</strong> such as speeding, running red
lights, or other moving violations. The cameras <strong>do not capture vehicle speed</strong> and are solely
used for investigative purposes related to public safety.</p>
</blockquote>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/leander-tx-flock-faq.pdf" class="collapsible">Leander TX — Flock FAQ</a>
@<a href="https://footnote4a.org/blog/speed-cameras/columbia-mo-flock-faq.pdf" class="collapsible">Columbia MO — Flock FAQ</a>
@<a href="https://footnote4a.org/blog/speed-cameras/everett-wa-flock-faq.pdf" class="collapsible">Everett WA — Flock FAQ</a></p>
<p>Technically, that appears to be true. “Flock Safety cameras” are not used for traffic enforcement —
RedSpeed’s cameras are. But they operate on Flock technology, within the Flock network.</p>
<p>Flock’s Transparency Portals go further. The Thomasville, GA PD portal explicitly lists “speed
detection” as a prohibited use of Flock technology, and confirms that the system is used “for law
enforcement purposes only.”</p>
<p>Meanwhile, RedSpeed’s speed detection cameras are feeding <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> streams directly into this same
network via Wing LPR. Data from a speed detection system enters a platform that lists speed
detection as a prohibited use.</p>
<p><img src="https://footnote4a.org/blog/speed-cameras/thomasville-transparency-portal.png" alt="Thomasville GA PD — Flock Transparency Portal (screenshot, March 26, 2026)" class="collapsible"></p>
<h3>It’s not <em>our</em> cameras</h3>
<p>The Flock letter on page 5 of the HCSO proposal says Flock provides “an additional layer of
software to the Redspeed cameras (speed and red light).” The transmittal says “Integrated Flock
means RedSpeed’s cameras are feeding the Wing System for enforcement synergy.” The pricing says
“Flock Wing License(s)” are included in a speed enforcement contract.</p>
<p>Flock’s defense rests on a technicality: <em>its</em> cameras don’t capture speed; <em>its</em> technology is
merely consuming the video feed from someone else’s speed cameras and processing it for entirely
different purposes. Whether that distinction will satisfy a legislature, or the parents whose
children are being filmed remains to be seen.</p>
<h3>The Partner Page</h3>
<p>RedSpeed claimed to be the only Flock-integrated vendor for school zone enforcement as of March
2024. As of March 2026, Flock’s partner program page lists several other automated traffic
enforcement companies as “Channel Providers.”</p>
<p>Maybe Flock gave them different territories, outside school zones.</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/flock-partner-ate-providers.pdf" class="collapsible">Flock Partner Program — ATE Channel Providers</a></p>
<h2>The Broader Pattern</h2>
<h3>The GSP Ticket</h3>
<p>On December 26, 2025, Georgia State Patrol ticketed a motorcyclist for holding a cell phone while
riding. The citation read: <strong>“CAPTURED ON FLOCK CAMERA 31 MM 1 HOLDING PHONE IN LEFT HAND.”</strong></p>
<p>GSP called it a “unique circumstance.” The ticket was dropped in court. <a href="https://www.eff.org/deeplinks/2026/03/traffic-violation-license-plate-reader-mission-creep-already-here">EFF described the
incident</a>
as an example of the mission creep it has “long warned about” with surveillance infrastructure.</p>
<p>It is the kind of one-off incident Flock can dismiss. Its long-standing RedSpeed partnership is not.</p>
<h3>Brookhaven, GA</h3>
<p>In <a href="https://web.archive.org/web/20201020111018/https://www.brookhavenga.gov/police/page/brookhaven-uses-technology-reduce-school-zone-speeding">Brookhaven, GA’s
words</a>,
RedSpeed cameras feed “real-time alerts” into “Brookhaven’s existing License Plate Reader (LPR)
platform to identify sex-offenders, protective orders, and wanted persons for increased safety in
school zones.”</p>
<p>Even if you are a concerned parent thinking sounds like a good idea, the practical value of such a
system is questionable at best. Police are not going to act on these “real-time alerts” each time
anyone under a protective order — many of which are not the result of any criminal activity, let
alone any criminal activity involving children — drives through a school zone.</p>
<p>The system’s real-time capabilities, like watchlists and speeding tickets, are secondary. The real
value is in gathering massive amounts of videos and photos of everyone entering a school zone —
parents, teachers, students.</p>
<p>RedSpeed’s strong marketing emphasis on video quality (15 Megapixels, 30 frames per second), raises
questions as well. If a regular Flock LPR, which RedSpeed says is of “lower quality,” is accurate
enough to perform ALPR and create evidence, how is a camera where you can count the pimples on your
middle schooler’s nose an advantage?</p>
<p>The point isn’t better traffic enforcement: it’s high-definition video surveillance.</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/brookhaven-redspeed-flock-wayback.pdf" class="collapsible">Brookhaven GA — RedSpeed Flock Integration (Wayback Machine, Oct 2020)</a></p>
<h3>Tampa’s Piggyback</h3>
<p>In Hillsborough County’s seat, Tampa, <a href="https://www.cltampa.com/news/tampa-city-council-could-vote-to-approve-flock-integrated-speed-cameras-in-school-zones/">RedSpeed scored third on an RFP but the council unanimously
voted for the contract
anyway</a>.
Creative Loafing Tampa noted that there was “no indication in the backup materials why the third
place proposal was chosen.”</p>
<p>Before the vote, Creative Loafing reported, “several council members noted they spoke with the Chief
and were assured the data wouldn’t be inappropriately shared.” Council member Lynn Hurtak said “the
only time they are allowed to use this technology is to share it with other agencies when they have
an open case.”</p>
<p>If that’s the policy, it isn’t in the sheriff’s contract.</p>
<h2>Making the Quiet Part Loud</h2>
<p>Flock quietly sells Wing integration in the background while partners like RedSpeed bundle it for
easy consumption by sheriffs and police chiefs. Contracts are kept minimal — no data governance, no
privacy language, no mention of the surveillance layer. The RFP asks for ALPR. The proposal delivers
Flock. The contract says nothing about what Flock does with the data. Nobody on city council asks,
because the pitch is about school safety and the cameras are “violator-funded.”</p>
<p>Across the country, communities have begun pushing back against Flock’s surveillance network.
Austin, Cambridge, Eugene, Evanston, and dozens of other jurisdictions have canceled, paused, or
refused to renew Flock contracts after audits revealed immigration enforcement access,
discriminatory searches, and data sharing that violated state law.</p>
<p>Those fights were about Flock cameras communities <em>knew</em> they were buying. The unified Wing network
is different: residents are now told they’re getting school zone speed cameras, but the video is
being routed into a national surveillance network with no contractual guardrails; or they’re being
told they’re getting license plate readers only to find them watching them shoot hoops.</p>
<p>Flock, RedSpeed, the Sheriff, and elected officials are tired of the push-back. They’re actively
restructuring to keep the public under surveillance and in the dark. We can’t let them.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[The Platform: Flock Safety Is Running on Promises, Not Policy]]></title>
            <link>https://footnote4a.org/news/the-platform</link>
            <guid isPermaLink="false">https://footnote4a.org/news/the-platform</guid>
            <pubDate>Thu, 26 Mar 2026 15:30:00 GMT</pubDate>
            <description><![CDATA[Flock Safety's three campaign promises — local control, no federal access, no employee access — are contradicted by Dunwoody PD audit logs, an FBI criminal complaint, and a Flock training video recorded on a live police account.]]></description>
            <content:encoded><![CDATA[<p>Flock Safety has been running on the same platform for years. Not a technology platform — a
political one. Three promises, repeated at every city council meeting, embedded in every sales
pitch, printed on every FAQ page. The kind of promises a candidate makes when they need the room to
stop asking questions and start signing contracts.</p>
<p><a href="dunwoody-ga-mar2026">Audit logs</a> and user exports from a mid-sized Georgia suburb, a <a href="https://footnote4a.org/blog/the-platform/transcript-gaby-mahoney-video.txt">Loom training
video</a> recorded on a live account in
Washington state, and a federal criminal complaint filed in the Southern District of
Texas all tell a different story than the one Flock tells on the campaign trail.</p>
<h2>The Stump Speech</h2>
<p>Flock’s Privacy &amp; Ethics page states that “only your
agency decides who to share data with, not Flock.” Their <a href="https://footnote4a.org/blog/the-platform/flock-faq.pdf">FAQ</a>
goes further: “Nobody from Flock Safety is accessing or monitoring your footage.”</p>
<p>@<a href="https://footnote4a.org/blog/the-platform/flock-privacy-ethics.pdf" class="collapsible">Flock Safety — Privacy &amp; Ethics</a></p>
<p>A <a href="https://footnote4a.org/blog/the-platform/flock-blog-does-flock-share-data-with-ice.pdf">January 2026 blog post</a> insists
that “<abbr class="md-tooltip" data-tooltip="U.S. Immigration and Customs Enforcement">ICE</abbr> does not have direct access to Flock cameras, systems, or data.” It lists a number of
“pilot projects,” including a “<abbr class="md-tooltip" data-tooltip="U.S. Customs and Border Protection">CBP</abbr> Pilot: May 9, 2025 to August 24, 2025.” These pilot projects
“effectively enabl[ed prospective customers] to test the product before committing to it.” In other
words, they got access.</p>
<p>Flock CEO Garrett Langley posted
“<a href="https://footnote4a.org/blog/the-platform/flock-blog-statement-network-sharing.pdf">Setting the Record Straight: Statement on Flock Network Sharing, Use Cases, and Federal Cooperation</a>”
on June 19, 2025; smack-dab in the middle of <abbr class="md-tooltip" data-tooltip="U.S. Customs and Border Protection">CBP</abbr>’s pilot program. Regardless, he assured his readers
on the topic of federal access: “it is a local decision. Not my decision, and not Flock’s decision.”</p>
<p>Every city council gets the same pitch. Every council delivers it to constituents. The assurance
that access is controlled, limited, and local is what gets the contracts signed. Three specific
planks in the platform:</p>
<ol>
<li><strong>Only your agency controls your data.</strong></li>
<li><strong>Federal agencies do not have direct access.</strong></li>
<li><strong>Nobody from Flock is accessing your footage.</strong></li>
</ol>
<p>None survive the paperwork.</p>
<h2>The Campaign Trail</h2>
<p>On February 26, 2025, at 10:47 PM Eastern, a Flock employee ran a search on Dunwoody, Georgia’s live
surveillance network. The query was “chicken truck.” Then “cattle truck” — four more times. Then
“lawnmower.”</p>
<p>The employee was Bob Carter, VP of Strategic Relations and Business Development at Flock Safety. He
is not a police officer. He is a sales executive with a fully enabled search account on Dunwoody’s
production network, with access to every camera in the Dunwoody sharing pool and far beyond.</p>
<p>Carter’s complete 2025 search record, read chronologically, is its own argument.</p>
<p>February 26, approaching midnight Eastern: “chicken truck,” then “cattle truck” four consecutive
times, then “lawnmower.” Thirteen networks each. No case number.</p>
<p>By June 23: “white racecar with black stripes,” <em>“potatoe chip van”</em> (his spelling, verbatim), “ice
cream truck,” “unicycle,” “rocket car.” The misspelling is Carter’s own — Dan Quayle’s ghost,
haunting a live surveillance system. A rocket car does not exist in civilian traffic.</p>
<p>Carter kept returning to the unicycle through July and into the fall, workshopping the same searches
like a candidate who can’t land a stump speech. By August he’d escalated to 892-network lookups —
taking a locally-spotted vehicle and running it against the entire Flock network. In September, a
blue Honda sedan toggled four times between a 13-network search and an 892-network sweep. By
October, he’d moved from vehicles to people: “person on skateboard,” “person wearing orange vest and
construction hat,” and the same yellow racecar searched three times in under an hour.</p>
<p>By December 9: “flatbed truck with lawn equipment,” “usps truck,” “ups truck,” “fedex truck.”</p>
<p>While Carter was busy maybe tracking his package, his colleague, Flock SVP Chris Colwell,
<a href="https://footnote4a.org/blog/the-platform/colwell-email-december-9-2025.pdf">sent out an email blast</a> to Flock customers
announcing that officer names, license plates searched, and open-text search reasons were
<a href="https://footnote4a.org/news/secret-searches">henceforth removed</a> from audit logs.</p>
<p>No longer would we be able to see Flock employees tracking their Amazon packages.</p>
<p>Carter’s March 4 session set his personal record: two consecutive lookups sweeping 6,350 camera
networks simultaneously. While we will never know what fever dream of unicycles and race cars is on
a loop in Carter’s mind, Flock will no longer let agencies across the country — from Virginia to
Washington — know that a Flock VP searched “their” data for “<a href="https://footnote4a.org/?l=SIZ3850">SIZ3850</a>” — which,
according to <a href="http://lookupaplate.com">lookupaplate.com</a>, isn’t even a unicycle or a Honda.</p>
<p>There will no longer be reasons, names, or case numbers to keep an eye on Flock executives running
midnight nationwide searches for rocket cars and unicycles on a national surveillance network.</p>
<p>This is what “Nobody from Flock Safety is accessing or monitoring your footage” looks like in
practice.</p>
<h2>The Rest of the Ticket</h2>
<p>Because no good trip is taken solo, Carter was not running alone. Several Flock employees were
created on Dunwoody’s account and given access as if they were Dunwoody police officers and command
staff. In other departments’ logs, their searches appear as Dunwoody PD’s.</p>
<p>A February 2026 user export shows six Flock employees holding Owner-level access, equivalent to a
department administrator. This grants them full control over search, cameras, users, and hotlists.</p>
<!-- collapsible: Flock employees created as Dunwoody PD members -->
<table>
<thead>
<tr>
<th>Name</th>
<th>Role at Flock Safety</th>
<th>Flock Level</th>
<th>Searches</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/1ZF2syYlA3JrV4">Bob Carter</a></td>
<td>VP, Strategic Relations &amp; Business Development</td>
<td>Member</td>
<td>401+</td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/AxIPssqrKy5Dt2v">Peter Barty</a></td>
<td>Staff Engineer, ML</td>
<td><strong>Owner</strong></td>
<td>~27</td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/YRqDWLzdz6TPSyQrg6hh">Kathleen Graham</a></td>
<td>NOVA Specialist</td>
<td>Member</td>
<td>~11</td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/1kjbF9BvtAM2s9mVwQ">Amanda Bruner</a></td>
<td>NOVA Onboarding Specialist</td>
<td>—</td>
<td>~5</td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/81t7ZyVNNNdPeW3">Randy Gluck</a></td>
<td>Manager, BD — 911/Emergency</td>
<td>Operator</td>
<td>~1</td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/21G0fuRpRUJszrwzwYCP5I">Bailey Quintrell</a></td>
<td>Chief Product Officer</td>
<td><strong>Owner</strong></td>
<td>—</td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/R7TVTVVZ67TK7bVm">Cam Whiteman</a></td>
<td>Principal Product Manager</td>
<td><strong>Owner</strong></td>
<td>—</td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/23FPsUnhiLo4LXCEmAk5B4">Cory Charpentier</a></td>
<td>Senior Data Engineer</td>
<td><strong>Owner</strong></td>
<td>—</td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/24bGv5zeYlT9JWduQb">Martin Howley</a></td>
<td>Nova Product Lead</td>
<td><strong>Owner</strong></td>
<td>—</td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/1zdkCAiiORJUKZ1l8H">Jeff La Barge</a></td>
<td>Director of Product</td>
<td><strong>Owner</strong></td>
<td>—</td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/NBEeU0dSFBG3">Adam Snow</a></td>
<td>Director of Growth</td>
<td>Operator</td>
<td>—</td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/7YEhq6GkxBK0DAq">Myron Maret</a></td>
<td>Customer Success Technologist</td>
<td>Operator</td>
<td>—</td>
</tr>
</tbody>
</table>
<p><a href="dunwoody-staff-tables" class="text-xs">Dunwoody roster</a></p>
<p>Across 2025, Flock’s accounts generated hundreds of searches of Dunwoody’s network. Another Flock
entity — <a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/9biSFKvLKcxFI4Xyq3DmB0j">Lucidus Tech API</a> — is a
programmatic API account tied to a <a href="https://footnote4a.org/news/nova-dark">Flock acquisition</a>; Flock’s computer ran an
additional 132 searches between January and March. Another <a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/Aa1ssc5JwR51sgeTXhjpNxt1YQ8UpfV">API User
(Forcemetrics)</a> performed a single
search in September 2025. Dunwoody at times appears more like Flock’s personal software lab than a
functional police department.</p>
<p>The supporting cast is worth a glance. Amanda Bruner (Nova Onboarding Specialist): 5 searches of the
same Georgia license plate over ten weeks, each sweeping between 887 and 891 agencies. No case
number. An onboarding employee tracking a specific vehicle for two and a half months. Kathleen
Graham (Nova Specialist): 11 searches of the same plate over three days, each across 888 networks.
One at 11:40 PM. Randy Gluck (Manager, BD — 911/Emergency): 1 blank search — no query term, sweeping
898 networks. Peter Barty (Staff Engineer, ML): 27 searches, including one for a “Black Mercedes
GL450 4MATIC” across 45 networks.</p>
<p>Whether this is stalking or development work is irrelevant to the overall point: these are Flock
employees — and in some cases, likely not even that because Flock had not finished
<a href="https://footnote4a.org/news/nova-dark">its acquisition of Lucidus</a> in January — accessing a live ostensibly “law
enforcement only” network handling federally-protected data from databases like <abbr class="md-tooltip" data-tooltip="National Crime Information Center">NCIC</abbr>.</p>
<p>And then there is <a href="https://footnote4a.org/news/flock-intelligence">Flock Intelligence</a>. This is an unidentified operator
that made 606 searches of Dunwoody’s network over five months, with identity, search filters, and
case numbers fully redacted in the audit log. It appears alongside several other explicitly
Flock-internal organizations in network logs (e.g., “Flock Safety - Admins,” “Flock Safety -
Engineering”).</p>
<p>Most Flock Intelligence queries used the AI-powered <a href="https://footnote4a.org/news/freeform-freeforall">freeform search</a>.
Some show patterns consistent with ongoing vehicle tracking; others searched for political
expression — vehicles with Trump bumper stickers, “don’t tread on me” flags. Peter Barty’s Mercedes
also appears as a Flock Intelligence query, suggesting “Flock Intelligence” may be a test account
the Nova team uses to search live data.</p>
<p>Flock Intelligence is a separate entity not found in Dunwoody PD’s internal department logs: it
shows up only in network-level audits, meaning that since the December changes, neither Dunwoody nor
anyone else has any visibility into these searches as they are happening. The named employees in
Dunwoody’s account entered through Dunwoody’s front door. Flock Intelligence came in through the
side.</p>
<p>Flock’s <a href="https://footnote4a.org/blog/the-platform/flock-faq.pdf">FAQ</a> is unequivocal: “Nobody from Flock Safety is
accessing or monitoring your footage.” The audit log shows this to be false hundreds of times and on
multiple levels.</p>
<p>The searches were audited — which is how we know about the unicycles and the race cars — but the
claim was not that access is audited. The claim was that it does not happen.</p>
<h2>The Backroom</h2>
<p>The audit logs document the front door and the side door. A Loom training video documents the back
door.</p>
<p>The video, titled <em>Managing Data Sharing and User Access in Your Account</em>, was recorded by Gaby
Mahoney, Regional Customer Success Manager at Flock Safety. It was made as a customer tutorial.
Rather than use a demo environment, she recorded it using the live national network that’s tracking
all of us.</p>
<p>@v<a href="https://footnote4a.org/blog/the-platform/flock-gaby-mahoney-admin-access-tutorial.mp4">Managing Data Sharing and User Access in Your Account — Gaby Mahoney, Flock Safety
<abbr class="md-tooltip" data-tooltip="Customer Success Manager">CSM</abbr></a></p>
<p>Mahoney’s second sentence, verbatim:</p>
<blockquote>
<p>So when I log into your account and go under the sharing tab, we can see that you still have
one-on-one sharing with some agencies.</p>
</blockquote>
<p><em><strong>When I log into your account.</strong></em> Not “when you log in.” She logs in. Her credentials. Someone
else’s account.</p>
<p>The address she visits is <code>sharing.flocksafety.com/networkSharing</code> — a live production URL, not a
demo environment — and the selected organization is Olympia WA PD.</p>
<p>At the one-minute mark, she moves to <code>users.flocksafety.com/organizations</code>. This endpoint
(“organizations” — plural) most likely does not exist for Flock customers. Assuming Flock follows
even remotely typical SaaS patterns — which, to be fair, may be a bold and overly-optimistic
assumption — agencies would use a singular “organization” endpoint where they can see their own
admin panel and nothing else.</p>
<p>The video confirms the endpoint’s “staff-only” status by appearing to enumerate every customer in
Flock’s system. Police agencies, HOAs, businesses, and residential users in multiple states all
appear on Gaby’s screen as she types “Olympia” into the single searchable list.</p>
<p><img src="https://footnote4a.org/blog/the-platform/orgs_global.png" alt="Flock's global organization list at users.flocksafety.com/organizations, visible to Mahoney via
her staff account" class="float-left mr-4 my-1 p-0 w-5/8"></p>
<p>She navigates directly into Olympia WA PD’s admin panel where her account surfaces the full
administrative interface: Profile. Organizations List. Organization. Devices. Roles. Users. Zones.
Authorized Access List. Transparency Portal. Integrations. Alerts &amp; FlockOS. Billing. Contact
Directory.</p>
<p>The Users tab shows Olympia WA PD’s sworn personnel — names, roles, last login dates, permission
flags. Two entries carry “Flock” (rather than “External”) as the identity provider. These would not
be subject to Olympia’s centrally-managed controls (like multi-factor authentication or automatic
account deactivation at the end of employment).</p>
<p><img src="https://footnote4a.org/blog/the-platform/olympia_users.png" alt="Olympia WA PD's complete user list as seen from Mahoney's Flock staff account"></p>
<p>The network sharing panel shows Olympia WA PD’s “Shared with me” list: every Washington state agency
sharing into Olympia’s network. Full permission sets for each. At the top of the screen is a red
“Revoke Out-of-State Sharing” button next to the page selector, showing 107 rows in the “Shared Networks”
table. Next to Aberdeen WA PD, a red button is shown:</p>
<p><img src="https://footnote4a.org/blog/the-platform/stop_accessing.png" alt="The &quot;Stop Accessing&quot; button — Mahoney's account can unilaterally terminate sharing between
Aberdeen WA PD and Olympia WA PD"></p>
<p>Mahoney’s account does not merely view Olympia’s configuration. The interface presents a live
control to terminate the data-sharing relationship between agencies — unilaterally, without the
knowledge or consent of the agencies.</p>
<p>It’s not only Flock’s CEO who can establish pilot programs while denying they exist, or Flock’s VP
that can search for rocket cars. Even its customer service reps have administrator access.</p>
<p>“Only your agency decides who to share data with, not Flock.”</p>
<h2>Redaction Day</h2>
<p>The Mahoney video is the Rosetta Stone for what happened next. It shows that Flock staff — even its
service reps and its sales execs — have high-level access to a live, national surveillance network.
They can view, edit, or delete configurations. The <abbr class="md-tooltip" data-tooltip="Customer Success Manager">CSM</abbr> who can click <em>Stop Accessing</em> on any
agency’s sharing relationship is the same person who walks agencies through narrowing their own
exposure. That access is the precondition for everything that followed.</p>
<p>It’s worth noting what the video is actually for: Mahoney is guiding Olympia — a Washington state
agency — through the process of <em>restricting</em> its sharing. Revoking out-of-state access, checking
who can search its cameras, deactivating users. Near the end she says, <em>“I also notice that you’re
not enabled for the statewide or national lookup so that will be good in terms of auditing
purposes.”</em></p>
<p>Limited access makes auditing easier. She knows what the inverse implies.</p>
<p>Five days after she posted the video, on December 9, while Carter was looking for his leaf blower,
Flock SVP Chris Colwell <a href="https://footnote4a.org/blog/the-platform/colwell-email-december-9-2025.pdf">sent an email</a> to
customer agencies titled
“<a href="https://footnote4a.org/news/secret-searches-part2">What you Need to Know About Recent Online Disclosures</a>.”</p>
<p>That email announced that audit logs would be stripped of officer names, license plates searched,
vehicle fingerprints, and open-text search reasons — framed as protecting active investigations and
officer safety. Flock did not merely stop recording these fields going forward — it also
<a href="https://footnote4a.org/news/harris-county-tx-jan2026">retroactively replaced</a> unique officer identifiers in its public
Transparency Portals with the word “REDACTED.” The prospective removal ensures new searches go
unattributed; the retroactive scrubbing rewrites the record of searches already conducted.</p>
<p>In the same email, Colwell <a href="https://footnote4a.org/news/colwell-files">recommended</a> that agencies do exactly what Mahoney
showed Olympia would “be good in terms of auditing purposes:” restrict sharing.</p>
<blockquote>
<p>Reviewing your sharing settings and considering a temporary shift from Nationwide Lookup to
Statewide Lookup.</p>
</blockquote>
<p>He linked to an instructional video on how to do it.</p>
<p>Two days later, an FBI Supervisory Special Agent in Atlanta’s C9 Gang division
<a href="https://footnote4a.org/blog/the-platform/fbi-email-december-11-2025.pdf">forwarded</a> the
<a href="https://footnote4a.org/blog/the-platform/houston-hidta-bulletin-december-2025.pdf">Houston <abbr class="md-tooltip" data-tooltip="High Intensity Drug Trafficking Area">HIDTA</abbr> Officer Safety Bulletin</a>
to the broader intelligence community.</p>
<p>The bulletin <a href="https://footnote4a.org/news/fbi-investigation">described this site by name</a> and recommended that agencies
“ensure that their agency Flock settings have limited searches to sharing within state only or
exclude the states/agencies that release their audit logs.” It further recommended that officers
“ensure that the reason for the query be as vague as permissible (e.g., ‘Investigation’).”</p>
<p>Washington was named as one of the states from which <abbr class="md-tooltip" data-tooltip="Freedom of Information Act">FOIA</abbr>-obtained audit logs had originated. The
FBI was distributing instructions to help agencies evade the public records process — and one of its
own field divisions was simultaneously using Flock data to prosecute federal cases.</p>
<p>It was a busy period. Houston <abbr class="md-tooltip" data-tooltip="High Intensity Drug Trafficking Area">HIDTA</abbr> authored the bulletin, <abbr class="md-tooltip" data-tooltip="Regional Organized Crime Information Center (&quot;Serving Alabama, Arkansas, Florida, Georgia, Kentucky, Louisiana, Mississippi, North Carolina, Oklahoma, South Carolina, Tennessee, Texas, Virginia and West Virginia, as well as Puerto Rico and the U.S. Virgin Islands.&quot;)">ROCIC</abbr> — one of the <abbr class="md-tooltip" data-tooltip="Regional Information Sharing Systems">RISS</abbr> centers
<a href="https://footnote4a.org/news/riss-shell-game">documented elsewhere on this site</a> as carrying direct Flock database access
— distributed it to law enforcement coordinators on December 10, and the FBI’s Atlanta office
forwarded it on December 11. At approximately the same time, Flock implemented
<a href="https://footnote4a.org/news/more-burdensome-transparency">a blanket VPN block</a> for all public transparency portals —
which it holds out to be public accountability tools. A week later, Cyble, a Flock-affiliated firm,
filed false abuse reports with Cloudflare in an
<a href="https://footnote4a.org/news/cyble-downtime">attempt to take this site offline</a>.</p>
<p>That is the service Flock was providing in December 2025: helping agencies make their surveillance
data harder to audit while simultaneously stripping the audit logs of meaningful content, blocking
anonymous access to public records, and attempting to silence the publication that had prompted the
transparency requests in the first place.</p>
<p>And Carter stopped looking for unicycles and racecars.</p>
<h2>The Candidate</h2>
<p>On December 18, 2025, an affidavit in support of a criminal complaint was filed in the Southern
District of Texas, Case No.
<a href="https://www.courtlistener.com/docket/72521356/united-states-v-boyd/?order_by=desc">4:25-mj-770</a>.</p>
<p>@<a href="https://footnote4a.org/blog/the-platform/criminal-complaint-4-25-mj-770.pdf" class="collapsible">Criminal Complaint — Case 4:25-mj-770</a></p>
<p>The affiant, Ryan Hilz, states under oath that he personally searched the Flock system. In ¶5:
“Affiant also searched the Hyundai’s license plate through the FLOCK Safety System, from
approximately November 15, 2025 12:00am through 9:00am.” He names a specific camera — “DB15 –
Collingsworth (WB) from Broyles” — and narrows it to a two-minute window, 6:33am to 6:35am. In ¶6:
“Affiant searched the Cadillac’s license plate through the FLOCK Safety System.” In ¶12, he reviewed
Flock images from November 8 showing both vehicles parked side by side. He is not describing results
handed to him by a colleague. He is describing searches he ran, cameras he queried by name, and
images he personally reviewed.</p>
<p>The audit logs don’t show these searches. Between November 1 and December 1, 2025, the Hyundai plate
(<a href="https://footnote4a.org/?l=WFV2638">WFV2638</a>) was searched 81 times in the Flock system — by Houston PD officers, Harris
County Constable deputies, and two Harris County Sheriff’s Office users (V. Pag and m. bar). The
Cadillac plate (<a href="https://footnote4a.org/?l=WSF6471">WSF6471</a>) was searched 86 times, again by Houston PD and Constable
personnel, plus a handful of <abbr class="md-tooltip" data-tooltip="Harris County Sheriff&#39;s Office">HCSO</abbr> entries logged only as “C.” — a single initial with no last name.
Harris County Sheriff’s Office does have a user account matching Hilz:
<a href="https://footnote4a.org/pd/6521-harris-county-tx-so/operator/Pens2QxA?sort=date_desc">“R. Hil.”</a> That account’s last
recorded search was May 16, 2025 — six months before the robbery. It does not appear in either
plate’s November search history.</p>
<p>Hilz swears he searched — literally, swears, on penalty of perjury. The cameras he names are in the
Houston network where 167 other searches by other officers <em>are</em> logged. There is an “R. Hil” with
the Harris County TX Sheriff’s Office, but that account went dormant months earlier. Either he
searched under someone else’s credentials — which means the audit trail attributes his work to a
different officer, defeating the purpose of individual accounts and probably violating several
federal regulations — or he accessed Flock through a pathway that doesn’t generate the same audit
record, which means there are doors into the system that the logs don’t cover.</p>
<p>That gap matters because of who Hilz is. A federal
<a href="https://www.fbi.gov/about/faqs/do-fbi-agents-work-with-state-local-or-other-law-enforcement-officers-on-task-forces">Task Force Officer</a>
(<abbr class="md-tooltip" data-tooltip="Task Force Officer">TFO</abbr>) is a state or local employee — a sheriff’s deputy, a city cop — assigned to work under a
federal agency, usually through a formal agreement like the FBI’s Violent Crime Task Forces or <abbr class="md-tooltip" data-tooltip="U.S. Immigration and Customs Enforcement">ICE</abbr>’s
<a href="https://footnote4a.org/ice-287g">287(g) program</a>. The <abbr class="md-tooltip" data-tooltip="Task Force Officer">TFO</abbr> keeps their local paycheck and local credentials, possibly
including any Flock accounts tied to their home agency. But TFOs report to a federal supervisor,
work out of a federal field office, investigate federal crimes, and file in federal court. The local
credentials are what make TFOs valuable to the feds — they bring access that the federal agency
could not get on its own. This is what Flock means when it says the feds don’t have “<em>direct</em>”
access.</p>
<p><img src="https://footnote4a.org/blog/the-platform/complaint_p2.png" alt="Affidavit in Support of a Criminal Complaint, Case 4:25-mj-770 — paragraph 1"></p>
<p>The first paragraph of Hilz’s affidavit:</p>
<blockquote>
<p>I am a Task Force Officer with the Federal Bureau of Investigation (hereafter “FBI”) and an
Investigator with the Harris County Sheriff’s Office (hereafter “<abbr class="md-tooltip" data-tooltip="Harris County Sheriff&#39;s Office">HCSO</abbr>”) and have been employed by
<abbr class="md-tooltip" data-tooltip="Harris County Sheriff&#39;s Office">HCSO</abbr> since November 2012. <strong>During my employment with <abbr class="md-tooltip" data-tooltip="Harris County Sheriff&#39;s Office">HCSO</abbr> and the FBI</strong>, I have been trained in
investigations relating to violations of the United States Federal Criminal Code […] I am
currently assigned to the Houston Division of the FBI, Violent Crime Task Force (hereafter
“<abbr class="md-tooltip" data-tooltip="Violent Crime Task Force">VCTF</abbr>”), and have been since June 2020. My primary investigative responsibilities include crimes
occurring within the Southern District of Texas.</p>
</blockquote>
<p>Read that introduction the way you’d read a candidate’s bio on a campaign flyer. His actual employer
is <abbr class="md-tooltip" data-tooltip="Harris County Sheriff&#39;s Office">HCSO</abbr> — “employed by <abbr class="md-tooltip" data-tooltip="Harris County Sheriff&#39;s Office">HCSO</abbr> since November 2012,” buried mid-paragraph. But that is not the lead.
His opening words: “a Task Force Officer with the Federal Bureau of Investigation.” FBI first. <abbr class="md-tooltip" data-tooltip="Harris County Sheriff&#39;s Office">HCSO</abbr>
second. The phrase “during my employment with <abbr class="md-tooltip" data-tooltip="Harris County Sheriff&#39;s Office">HCSO</abbr> <em>and the FBI</em>” frames both agencies as concurrent
employers — not a county deputy on loan, but a man who works for the FBI and also, incidentally,
receives a paycheck from Harris County.</p>
<p>But maybe Hilz took a creative writing class and “Affiant searched” is not to be interpreted
literally; his may be a sworn statement that sacrifices accuracy for brevity, the testimonial
equivalent of “close enough for government work.”</p>
<p>But whether Hilz is committing some light perjury, whether Flock is misleading its customers about
its relationship with the feds, or whether “no direct access” in a system riddled with Flock
employee and <abbr class="md-tooltip" data-tooltip="Task Force Officer">TFO</abbr> backdoors is the very best Flock can do: Langley unequivocally broke his campaign
promise that it would be a local decision.</p>
<p>After “Hilz’s” Flock searches, the three suspects were transported to the FBI Houston Field Office
for interviews (¶26). Inside that field office, one of them was shown a Flock image of the Hyundai
and a Flock image of the Cadillac CTS (¶29).</p>
<p>An officer introducing himself as “a Task Force Officer with the [FBI]” showed Flock surveillance
images to a suspect in a federal criminal case, while he was being held by federal agents in an FBI
interrogation room in a federal building.</p>
<p>To dispel any remaining ambiguity about whether this was local, look to the signature block:</p>
<div class="grid grid-cols-2 align-middle place-items-center space-x-4 px-4">
  <img class="block max-w-full" src="https://footnote4a.org/blog/the-platform/hilz-signature.png" alt="Ryan Hilz signature, Case 4:25-mj-770 — signed
    Task Force Officer / Federal Bureau of Investigations">
  <pre class="font-mono block max-w-full not-prose">
Ryan Hilz
Task Force Officer
Federal Bureau of Investigations
  </pre>
</div>
<p>He signed as FBI — not <abbr class="md-tooltip" data-tooltip="Harris County Sheriff&#39;s Office">HCSO</abbr>. The only thing that supports that he might not <em>actually</em> be a fed is
that he misspelled the name of the agency he spent 16 pages claiming to work for. There is only one
“Investigation” in the Federal Bureau of Investigation.</p>
<p>The federal government’s sworn affiant lifts the veil on Flock’s empty promises: the federal
government has access, no matter how you spell it.</p>
<p>Flock’s own timeline confirms the infrastructure that made this possible. Its blog states that the
federal “pilot” program with the FBI concluded in 2023, and that “[i]n August of 2025, Flock
publicly announced it would no longer conduct pilot projects with federal agencies.” The “try” part
was cancelled; the “buy” part was not. The FBI <a href="https://footnote4a.org/news/flock-vs-foia">does not respond</a> to <abbr class="md-tooltip" data-tooltip="Freedom of Information Act">FOIA</abbr>
requests about Flock. Langley’s
“<a href="https://footnote4a.org/blog/the-platform/flock-blog-statement-network-sharing.pdf">Setting the Record Straight</a>” post,
published June 2025, assured readers that federal access was “a local decision” — while the <abbr class="md-tooltip" data-tooltip="U.S. Customs and Border Protection">CBP</abbr>
pilot he disclosed in January 2026 was actively running.</p>
<h2>The Fine Print</h2>
<p>The federal-access issue draws the most attention at council meetings, but the “sworn law
enforcement only” claim — which directly supports Flock’s assurance that “Nobody from Flock Safety
is accessing or monitoring your footage” — fails even within the agencies that own the accounts.</p>
<!-- collapsible: Non-sworn civilian staff with Flock access at Dunwoody PD -->
<table>
<thead>
<tr>
<th>Name</th>
<th>Role</th>
<th>Flock Level</th>
</tr>
</thead>
<tbody>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/1XiPxZV1A0WzfB">Adria Crum</a></td>
<td>Records Supervisor / Property &amp; Evidence Tech</td>
<td><strong>Owner</strong></td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/Xb5ZYEe1hJzdm7z0">Sybil Fisher</a></td>
<td>Police Crime Scene Technician</td>
<td><strong>Owner</strong></td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/1Z1Xl4NAij">KC Tate</a></td>
<td>Property &amp; Evidence Technician</td>
<td><strong>Owner</strong></td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/1mKsCZ1nFVVRCv">Kayce Lowe</a></td>
<td>Crime &amp; Intelligence Analyst</td>
<td><strong>Owner</strong></td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/8LUFrEHREMmNV7NIfpd">Kimberly Stone</a></td>
<td>Police Service Representative</td>
<td><strong>Owner</strong></td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/XZjVFCxWrLhAR5gB">Skylar Lewis</a></td>
<td>Public Safety Ambassador</td>
<td>Operator</td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/6lihSjmbxiYQED0">Eric Ziglin</a></td>
<td>Public Safety Ambassador</td>
<td>Member</td>
</tr>
<tr>
<td><a href="https://footnote4a.org/pd/4140-dunwoody-ga-pd/operator/29aOZuStONOfrf7leA">Paul Chastain</a></td>
<td>Public Safety Ambassador</td>
<td>Operator</td>
</tr>
</tbody>
</table>
<p>The pattern extends beyond individual agencies. The
<a href="https://footnote4a.org/news/riss-shell-game">Regional Information Sharing Systems (<abbr class="md-tooltip" data-tooltip="Regional Information Sharing Systems">RISS</abbr>)</a> — funded by <abbr class="md-tooltip" data-tooltip="Department of Justice">DOJ</abbr>, operated by
regional centers <a href="https://footnote4a.org/news/riss-shell-game">incorporated as private nonprofits</a> — is the task force
model applied to data: federal money, non-government hands, Flock access.</p>
<p>Five of its six centers carry direct Flock database access through <abbr class="md-tooltip" data-tooltip="RISS Intelligence — a federated search tool operated by RISS centers">RISSIntel</abbr>, a federated search
tool that lets <abbr class="md-tooltip" data-tooltip="Regional Information Sharing Systems">RISS</abbr> analysts query Flock’s data without maintaining individual Flock accounts.
<abbr class="md-tooltip" data-tooltip="Regional Organized Crime Information Center (&quot;Serving Alabama, Arkansas, Florida, Georgia, Kentucky, Louisiana, Mississippi, North Carolina, Oklahoma, South Carolina, Tennessee, Texas, Virginia and West Virginia, as well as Puerto Rico and the U.S. Virgin Islands.&quot;)">ROCIC</abbr>, the <abbr class="md-tooltip" data-tooltip="Regional Information Sharing Systems">RISS</abbr> center that <a href="https://footnote4a.org/news/fbi-investigation">distributed the Houston <abbr class="md-tooltip" data-tooltip="High Intensity Drug Trafficking Area">HIDTA</abbr> bulletin</a>
instructing agencies to evade public records requests, is one of them. The National Center for
Missing and Exploited Children (<abbr class="md-tooltip" data-tooltip="National Center for Missing and Exploited Children">NCMEC</abbr>) is named in
<a href="https://footnote4a.org/blog/the-platform/flock-legal-lpr-policy.pdf">Flock’s own LPR policy definition</a> as a hotlist data
source. <abbr class="md-tooltip" data-tooltip="National Center for Missing and Exploited Children">NCMEC</abbr> is a private organization. It populates the alerts that fire on your plate.</p>
<p>The <a href="https://footnote4a.org/blog/the-platform/iowa-alpr-report.pdf">ACLU/UIowa ALPR report</a> documented the same pattern
across Iowa: civilian analysts, support personnel, and non-law-enforcement government staff with
active Flock accounts across dozens of agencies.</p>
<p>The
<a href="https://le.fbi.gov/file-repository/cjis_security_policy_v6-0_20241227.pdf/view"><abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr> Security Policy</a>
is <a href="https://footnote4a.org/news/federal-insecurity">explicit about what this requires</a>. Section 5.12.1.2 mandates that all
personnel with access to Criminal Justice Information — including private contractor employees —
undergo fingerprint-based state and national background checks before access is granted. Section
5.1.1.5 requires that vendors sign the <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr> Security Addendum, which extends the full weight of <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr>
security requirements to their staff. Sections AU-9 and AU-11, aligned with <abbr class="md-tooltip" data-tooltip="National Institute of Standards and Technology">NIST</abbr> 800-53, require
that audit logs be protected from unauthorized modification and retained for at least one year.
Flock’s December audit-log stripping, its employee access without documented screening, and its
unilateral modification of log fields all appear to run afoul of these provisions.</p>
<p>When Story County, Iowa <a href="https://footnote4a.org/news/flock-access">requested Flock’s <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr> certification list</a>, Flock
produced 28 names — all with first names starting A through C, several illegible — and no one else.
No installers, no subcontractors, no overseas workers, and none of the employees running Flock’s own
<a href="https://footnote4a.org/news/flock-access">sales and training accounts</a> on production data. The list is the compliance
equivalent of Carter’s searches: performance art.</p>
<p>The contracts themselves offer no backstop. Flock has
<a href="https://footnote4a.org/news/trojan-contracts">moved its terms of service to a web URL</a> it controls unilaterally and can
change without customer notice. It requested that <a href="http://archive.org">archive.org</a>’s Wayback Machine exclude its website,
preventing any historical record of the terms as they existed when a city signed them. The new terms
<a href="https://footnote4a.org/news/own-nothing">strip data ownership</a> from agencies and supersede all prior agreements upon any
subsequent order — even a camera repair.</p>
<p>No policy implements the “sworn only” promise, no mechanism exists to enforce it, and the contracts
are written to ensure that no one can prove what they originally said. “Access is limited to sworn
law enforcement” is, at best, wishful thinking.</p>
<h2>The Town Hall</h2>
<p>When Dunwoody’s Flock contract came up for approval, the council heard the stump speech: access
controlled, limited, and local. Only your officers. Only for investigations. Only under oversight.
The Dunwoody City Council held its regular meeting on March 23, 2026. As part of its discussion of
the Dunwoody Flock contract, an “audit” — if we use the term loosely — would be delivered.</p>
<p>@<a href="https://footnote4a.org/blog/the-platform/dunwoody-council-meeting-agenda-packet-3-23-2026.pdf" class="collapsible">Dunwoody Flock Audit (Council Meeting Presentation) — March 23, 2026</a></p>
<p>The audit included a FAQ slide with question 3: <em>“Who can access the data, and how do you prevent
misuse?”</em> The city’s answer: “Access is limited to authorized, trained personnel who need it to
perform official duties.” The people who wrote that sentence had the audit log that showed a Flock
employee was using Dunwoody’s account to look for unicycles and race cars.</p>
<p>Flock Safety even sent its chief legal officer, Dan Haley, to address concerns from the public. A
resident had already recited <a href="https://footnote4a.org/news/dunwoody-ga-mar2026">the numbers</a> before Haley took the floor:
401 searches by Flock employees, Owner-level access, live drone footage and hotlist control. Haley
addressed none of it.</p>
<p>Haley spoke about machine learning training data — de-identified images, less than 1%, used to
improve plate-read accuracy. The city’s own attorney called the data-use provision a loophole and
said it could be closed in the new contract being negotiated. Haley corrected her on-mic: “It’s not
a loophole, it’s for system quality and improvement.” It wasn’t a question anyone had asked — not
even the FAQ.</p>
<p>The council member who asked <em>“It seems like Flock staff has access to our footage. Is that true?”</em>
got an answer about plate-design recognition models, but the real question, why a VP of Business
Development was searching for “potatoe chip van” on a live police network, went unasked by the
council or the city staff who “audited” Flock. Haley certainly did not volunteer an answer.</p>
<p>The Dunwoody police chief did confirm that Flock engineers had been inside the system “under
agreement” for integration and testing. There were no immediate objections from the dais to a
commercial company using city residents as surveilled guinea pigs — nor, for that matter, to
its marketing team <a href="drone-as-dataleak">using Dunwoody PD to shoot commercials</a>.</p>
<h2>The Endorsement</h2>
<p>Dunwoody’s Technology Director’s written assessment — submitted to council alongside the FAQ —
concluded that the risks of continued Flock use are “acceptable,” in part because “the users
accessing the data are law enforcement meeting <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services">CJIS</abbr> standards.”</p>
<p>The same assessment scored “<a href="https://footnote4a.org/news/official-use-only">Non-PD direct logins</a>” as a Yellow risk — a
documented, acknowledged problem that undercuts the memo’s overall conclusion, which rests on the
premise that only law enforcement has access.</p>
<p>The full security assessment matrix tells an even worse story.</p>
<p>@<a href="https://footnote4a.org/blog/the-platform/dunwoody-flock-security-assessment-matrix.pdf" class="collapsible">Dunwoody Flock Security Assessment Matrix</a></p>
<p>All six vendor remote access control items — “Vendor remote access controls,” “<abbr class="md-tooltip" data-tooltip="Multi-Factor Authentication">MFA</abbr>
enforcement,” “<abbr class="md-tooltip" data-tooltip="Privileged Access Management">PAM</abbr> (<abbr class="md-tooltip" data-tooltip="Just-In-Time (access provisioning)">JIT</abbr>, <abbr class="md-tooltip" data-tooltip="Securely storing credentials in an encrypted vault rather than sharing passwords directly">vaulting</abbr>, <abbr class="md-tooltip" data-tooltip="Emergency override procedure to access systems when normal authorization is unavailable">break-glass</abbr>, recording),” “<abbr class="md-tooltip" data-tooltip="Creating and removing user accounts and access rights">Provisioning/deprovisioning</abbr>,”
“Credential storage/password policy,” and “No backdoor accounts” — were rated Green.</p>
<p>That would be good, except the supporting evidence column for every one of them: <em>no evidence.</em> For
“No backdoor accounts,” the assessor specifically requested a written attestation from Flock’s
security leadership. It was “not specifically provided as requested.” Green anyway; we have
apparently entered a new era of vibe-based auditing and compliance.</p>
<p>Item Q4.6 asked whether Flock had made audit log field reductions since October 1, 2025. The answer:
none. The rating: Green. The assessment was prepared for the March 23, 2026 council meeting — more
than three months after Flock’s December 9, 2025, mass email blast to its customers announcing that
officer names, license plates searched, vehicle fingerprints, and open-text search reasons were
being removed.</p>
<p>The only item on the matrix rated Red was Q8.1: breach/security incident history. Flock told the
assessor it had <a href="https://footnote4a.org/news/never-hacked-facts">no breaches</a> in the past three years. The assessor noted
that “<a href="https://footnote4a.org/news/bishop-fox">camera breaches</a> have been highly publicized and should have been mentioned
at a minimum (December 2025).” Even the assessor could see that one. It probably would have been
hard to deny when Benn Jordan, the security researcher who made
<a href="https://www.youtube.com/watch?v=vU1-uiUlHTo">the video that exposed the problem</a>, spoke at the
start of the meeting.</p>
<p>The Mahoney video shows what no-evidence Green looks like from the inside.</p>
<p>After more than an hour of public comment and questioning, the council voted unanimously to defer
the Flock 911 contract to the April 13th meeting, pending completion of a new master service
agreement. The motion was made by Stacey Harris, seconded by Rob Price. No one voted against
deferral. No one voted to cancel.</p>
<h2>The Moment</h2>
<p>The reality is that non-sworn city staff have access. As do Flock employees. As does the FBI.</p>
<p>Flock’s standard response to this kind of reality check is to observe that employee access is
technically logged, that <abbr class="md-tooltip" data-tooltip="Task Force Officer">TFO</abbr> searches are formally local-agency queries, and that civilian staff
access is controlled by the agency rather than Flock. Even if that were all true, it’s a
description, not a solution.</p>
<div class="flex flex-col float-left mr-4 my-2">
<img class="w-70 m-0 p-0" alt="Flock account sharing text messages" src="https://footnote4a.org/blog/the-platform/keys.webp">
<div class="text-center mt-0 w-full text-xs not-prose">
Via <a href="https://unraveledpress.com/a-dea-agent-used-an-illinois-police-officers-flock-license-plate-reader-password-for-unauthorized-immigration-enforcement-searches/" rel="noopener noreferrer">Unraveled Press</a>.
</div>
</div>
<p>The people doing the account sharing don’t even know who does what searches; they consider getting
caught “undue attention” rather than a violation of federal security regulations and professional
standards. A <a href="https://www.wyden.senate.gov/imo/media/doc/wyden_letter_to_ftc_on_flockpdf.pdf">November 2025
letter</a> from Senator
Wyden of Oregon says his staffers were able to find Flock accounts for sale.</p>
<p>As a custodian of billions of data points on hundreds of millions of people, Flock should be trying
to prevent these problems, but instead it actively engineers them. Its public position is that of
the passive service provider in an imaginary world where local governments are in the driver’s seat.</p>
<p>In private, Flock employees are placed on police department rosters, so that a VP’s search for
rocket cars is attributed to the department, not Flock. Then it strips the audit fields that would
let officials detect the difference.</p>
<p>This analysis looked at a single, relatively small police department. There are tens of thousands of
users with law enforcement level access across 6,000+ departments, and hundreds, possibly thousands,
of those users were never vetted by anyone. Dunwoody deferred the vote. Other cities will face the
same choice. All that elected officials have to do is read the paperwork.</p>
<p>We don’t need to let Flock define
“<a href="https://footnote4a.org/blog/the-platform/haley-linkedin.png">this challenging political moment</a>.” We can vote them out.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>foia-transparency</category>
        </item>
        <item>
            <title><![CDATA[Who Is Flock Intelligence?]]></title>
            <link>https://footnote4a.org/news/flock-intelligence</link>
            <guid isPermaLink="false">https://footnote4a.org/news/flock-intelligence</guid>
            <pubDate>Tue, 24 Mar 2026 00:10:00 GMT</pubDate>
            <description><![CDATA[An unknown Flock-affiliated entity searched Dunwoody GA PD's camera networks 606 times in five months using AI-powered queries — many targeting political expression. Four other Flock-internal organizations also appear in the logs.]]></description>
            <content:encoded><![CDATA[<p>The <a href="dunwoody-ga-mar2026">Dunwoody GA PD audit data</a> released today contains 606 searches by an
organization called <strong>“Flock Intelligence.”</strong> It is not a police department. It is not a government
agency. Every field that would identify the operator — name, filters, case number — is redacted with
<code>***</code>.</p>
<p>Flock Intelligence does not appear in any audit log before August 2025, and it is absent from the
org audit entirely. It only shows up in the network audit, meaning it searches Dunwoody’s cameras
from outside the department.</p>
<h2>The searches</h2>
<table>
<thead>
<tr>
<th>Month</th>
<th style="text-align:right">Total</th>
<th style="text-align:right">Freeform</th>
<th style="text-align:right">Search</th>
<th style="text-align:right">Convoy</th>
<th style="text-align:right">Other</th>
</tr>
</thead>
<tbody>
<tr>
<td>Aug</td>
<td style="text-align:right">21</td>
<td style="text-align:right">17</td>
<td style="text-align:right">1</td>
<td style="text-align:right">—</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Sep</td>
<td style="text-align:right">225</td>
<td style="text-align:right">164</td>
<td style="text-align:right">34</td>
<td style="text-align:right">22</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Oct</td>
<td style="text-align:right">164</td>
<td style="text-align:right">117</td>
<td style="text-align:right">40</td>
<td style="text-align:right">2</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Nov</td>
<td style="text-align:right">101</td>
<td style="text-align:right">95</td>
<td style="text-align:right">6</td>
<td style="text-align:right">—</td>
<td style="text-align:right">—</td>
</tr>
<tr>
<td>Dec</td>
<td style="text-align:right">95</td>
<td style="text-align:right">93</td>
<td style="text-align:right">2</td>
<td style="text-align:right">—</td>
<td style="text-align:right">—</td>
</tr>
</tbody>
</table>
<p>Over 80% of Flock Intelligence’s queries are FreeForm searches — the AI-powered text prompt feature
<a href="freeform-freeforall">analyzed in detail here</a>. That earlier analysis showed that Flock’s moderation
system warns about political searches but does not block them. Flock Intelligence’s searches confirm
that pattern.</p>
<h2>Political expression</h2>
<p>Among the 170 unique text prompts, a cluster targets vehicles by political expression:</p>
<ul>
<li>“a truck with a trump flag on it” — <code>warn</code></li>
<li>“red honda accord with a trump bumper sticker” — <code>warn</code></li>
<li>“green car with trump bumper sticker” — <code>warn</code></li>
<li>“vehicle with trump bumper sticker” — <code>warn</code></li>
<li>“a SUV with a yellow don’t tread on me flag” — <code>warn</code></li>
<li>“a red nissan rogue with a don’t tread on me flag” — <code>warn</code></li>
<li>“don’t tread on me flag” — <code>warn</code></li>
<li>“american flag” — <code>warn</code></li>
<li>“a car with a british flag” — <code>warn</code></li>
<li>“dallas cowboy flag”</li>
<li>“vehicle with a Dallas Cowboys star sticker”</li>
<li>“vehicle with a Falcons logo”</li>
</ul>
<p>Every political expression search was warned — and every one went through. The sports team searches
passed without even a warning, which tells you where the moderation system draws its lines and how
firmly it enforces them.</p>
<h2>What got blocked</h2>
<p>The moderation system blocked searches describing occupants:</p>
<ul>
<li>“car with two occupants” — <code>block</code></li>
<li>“car with 2 occupants” — <code>block</code></li>
<li>“4 door truck with 4 individuals” — <code>block</code></li>
<li>“four people inside car” — <code>block</code></li>
<li>“green vehicle with a roof rack 4 individuals inside” — <code>block</code></li>
</ul>
<p>And a handful of subjective descriptors:</p>
<ul>
<li>“green car with trashy stickers on it” — <code>block</code></li>
<li>“orange car with person and red shift” — <code>block</code></li>
<li>“crazy looking car” — <code>block</code></li>
</ul>
<p>Other warned searches include “pink breast cancer awareness plate,” “pink ribbon sticker on plate,”
and “german shepard in back of pickup truck.”</p>
<p>So: searching for a specific political candidate’s bumper sticker gets a warning and goes through.
Searching for “crazy looking car” gets blocked. That is the moderation hierarchy Flock built.</p>
<h2>Recurring patterns</h2>
<p>Some searches recur across months in ways that suggest either ongoing tracking:</p>
<p><strong>“Black Mercedes GL450 4MATIC”</strong> appears in October, November, and December. In December it evolves
into “black Mercedes-Benz GLB 250 SUV” and several variations — the same vehicle tracked across a
quarter, description refined over time.</p>
<p><strong>“Armored truck OR Brinks truck”</strong> (and variations) appears every month from August through
December. This is the most consistent search pattern in the dataset.</p>
<p><strong>“White Dodge Charger with black roof and black stripe”</strong> recurs October through December with
slight wording changes.</p>
<p>Again, this is not a police agency. It is a private party performing long-term surveillance on
locations of Mercedes and cash-in-transit vehicles.</p>
<p>Possible reasons range from harmless testing queries (over multiple months — so that seems
unlikely), to employees selling intelligence to criminal actors, to some sort of commercial service.</p>
<h2>Person searches</h2>
<p>Three prompts target people rather than vehicles:</p>
<ul>
<li>“white t-shirt” (objectClass:person)</li>
<li>“person on scooter” / “person with scooter” (objectClass:person)</li>
<li>“yellow backpack” (objectClass:person)</li>
</ul>
<p>All were allowed by moderation.</p>
<h2>Other Flock organizations in Dunwoody’s logs</h2>
<p>Flock Intelligence is not the only Flock-affiliated entity searching Dunwoody’s cameras. Four others
that we’ve seen previously appear here as well:</p>
<table>
<thead>
<tr>
<th>Organization</th>
<th>Months</th>
<th style="text-align:right">Records</th>
</tr>
</thead>
<tbody>
<tr>
<td>Flock City PD - Law Enforcement Demo</td>
<td>Jan–Dec</td>
<td style="text-align:right">~294</td>
</tr>
<tr>
<td>Flock Safety - Admins</td>
<td>Feb–Jun</td>
<td style="text-align:right">~33</td>
</tr>
<tr>
<td>Flock RTCC</td>
<td>Jan, Mar</td>
<td style="text-align:right">~21</td>
</tr>
<tr>
<td>Flock Safety - Engineering</td>
<td>Jun</td>
<td style="text-align:right">~1</td>
</tr>
</tbody>
</table>
<p>“Flock City PD - Law Enforcement Demo” searches Dunwoody’s network every month of the year. That is
a demo environment running against a live police department’s surveillance data — not a sandbox.</p>
<p>“Flock RTCC” — Real-Time Crime Center — searched Dunwoody’s network in January and March.</p>
<p>“Flock Safety - Admins” and “Flock Safety - Engineering” are self-explanatory: Flock employees with
direct access to customer camera networks.</p>
<p>In total, Flock-affiliated entities account for over 1,000 searches of a single police department’s
camera network in 2025.</p>
<h2>What is Flock Intelligence?</h2>
<p>It is not listed as a law enforcement agency. It does not appear on Flock’s public-facing product
pages.</p>
<p>Its operator identities, search filters, and case numbers are all redacted in the logs Flock
provides to its own customers. Dunwoody PD cannot audit who at Flock Intelligence searched their
network, what they were looking for, or why.</p>
<p>As I publish this, at 6:10pm (CDT) on March 23, 2026, Dunwoody PD and Dan Haley — Flock’s chief
legal officer — are telling the City Council that access is only granted to police agencies, and
only for criminal investigative purposes.</p>
<p>Again, police and Flock say one thing, the logs say another.</p>
<p>Someone, somewhere — who is not police — is tracking live data about these vehicles.</p>
<hr>
<p class="text-sm"><em>March 24, 2026 update</em>: Removed claims about Flock Nova pending further verification.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[You Will Own Nothing: How Flock Safety Keeps Cities From Their Own Surveillance Data]]></title>
            <link>https://footnote4a.org/news/own-nothing</link>
            <guid isPermaLink="false">https://footnote4a.org/news/own-nothing</guid>
            <pubDate>Mon, 23 Mar 2026 01:15:00 GMT</pubDate>
            <description><![CDATA[Flock customers technically 'own' their footage — but can't access high-resolution originals, get images with unreliable timestamps and scrubbed metadata, and must submit formal requests through Flock's own evidence platform just to obtain their own records.]]></description>
            <content:encoded><![CDATA[<p>In December 2025, I wrote
<a href="trojan-contracts">an article about Flock changing its Terms and Conditions</a>. That change included
some important language that made “Footage” (a term defined in the contract) no longer “owned” by
Flock customers. Specifically, I wrote:</p>
<blockquote>
<p>Even if the original footage is available to Flock, you may get an edited or altered version (e.g.
cropped or with watermarks overlaid), or a reduced-resolution version. You may also get it late,
or never, and the conditions for access are at Flock’s discretion.</p>
</blockquote>
<p>Although Flock revised its terms again soon after, restoring on-paper “ownership” to the customer
but giving itself broader license to do what it wants with copies, the prediction held. An open
records response from Missouri shows the result of Flock’s policy of “ownership.”</p>
<h2>The Original Footage</h2>
<p>The request was made by <a href="https://deflockjoplin.today/">Deflock Joplin</a>, the group responsible for
the January 2026 headline “<a href="https://www.kctv5.com/2026/01/12/joplin-officer-no-longer-employed-after-alleged-misuse-license-plate-tracking-system/">Joplin officer no longer employed after alleged misuse of license plate
tracking system</a>.” <a href="https://www.muckrock.com/foi/joplin-20300/4th-and-maiden-flock-records-204786/">The records request</a> is straightforward:</p>
<blockquote>
<p>Recordings from the Flock LPR camera located at 4th and Maiden Ln from 2/16/2026 starting at 5:00
PM lasting until 6:00 PM. This camera is on the south west corner of the intersection facing a
southern direction. The records requested should include stills, video, and all other records
generated by the camera. I request the data from Flock OS and the camera’s internal storage.</p>
</blockquote>
<p>The City of Joplin charged $23.57 for the request and fulfilled it a couple of weeks after receiving
payment with a file “Flock_Safety_Search_Image_Results_3-9-2026_1-22-54PM.” The city did not include
40 minutes of footage/images, stating “we are currently experiencing a technical issue affecting
this functionality.”</p>
<p>While technical issues that prevent a city from accessing “its” data would be a cause for concern,
rumor has it that the “technical issues” in question occurred somewhere between the keyboard and the
chair, and the city did not understand how to save images. The city did supply the missing 40
minutes once the discrepancy was pointed out.</p>
<h3>World’s Fastest Truck</h3>
<p>As far as we know, Flock cameras take a series of images and/or a short video clip when they detect
motion. Flock and police often emphasize that it’s “only the license plate” or “just the back of the
vehicle.” Of course, the laws of physics dictate that you can’t know what’s in a picture before you
take it. This truck is a demonstration:</p>
<p><img src="https://footnote4a.org/blog/own-nothing/truck2.jpg" alt="Image #1 of black truck">
<img src="https://footnote4a.org/blog/own-nothing/truck1.jpg" alt="Image #2 of black truck"></p>
<p>These two images were taken in rapid succession. It’s hard to even tell the vehicles are in a
different location, but you can see the “Flock Safety” watermark is positioned
differently.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>These images are clearly of the front of the vehicle. But that’s not the interesting part.</p>
<h3>Metadata and Time Confusion</h3>
<p>Some of these images have been used as evidence at criminal trials, many in the “over 30 cases” that
Flock likes to falsely cite as upholding the constitutionality of its cameras. The timestamps on the
Joplin images should give anyone relying on that evidence pause.</p>
<p>The filename for both images contains “2026-02-16T23-39-42.219+00-00”, suggesting the images were
taken less than 0.0005 seconds apart. That is neither possible, nor true, based on what’s in the
images: we can see the car moving maybe 10 feet. Tacomas don’t typically travel at hypersonic speeds
exceeding Mach 17.</p>
<p>The timestamp in the picture is “2/16/2026 17:39:42 CDT.” This is an odd mix. The date is
unmistakably American (mm/dd/yyyy), but the time is 24 hours rather than am/pm. On February 16,
that’s not confusing. Four days earlier, it might have been.</p>
<p>But even more confusing is that the timezone is labeled as CDT, or Central Daylight Savings Time
(UTC-5). Daylight savings is not in effect in the middle of February in Missouri, when CST (UTC-6)
is in effect. The image is ambiguous as to whether it shows an image taken at 5:39pm or 4:39pm.</p>
<p>The timestamp in the filename (23:39:42.219 UTC) suggests the labeling (“CDT”) is off, but we’ve
already established that it is not possible for the timestamp to be accurate for both images until
we have hypersonic Tacomas.</p>
<p>The (EXIF) metadata has been scrubbed, so there is no third hint.</p>
<p>That leaves these images without a reliable timestamp. These aren’t abstract concerns — they cast
doubt not only on the accuracy of these files, but on the accuracy of every other image produced by
the same system.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<p><img src="https://footnote4a.org/blog/own-nothing/sunset-progression.jpg" alt="Sunset in Joplin"></p>
<p>The only way we can determine the time with any certainty is by looking at the position of the sun
and the 5:59pm sunset noted in the almanac for Joplin, MO, on February 16.</p>
<p>AI-based surveillance so high-tech you need a sundial to make sense of it.</p>
<h3>License Plate Detection</h3>
<p>The other piece of metadata in the image, below the timestamp, is a license plate: <span
class="text-nowrap font-mono">0FH D30</span>. According to <a href="https://www.lookupaplate.com/missouri/0FHD30/">lookupaplate.com</a>, the plate
corresponds to a 2014 Toyota Tacoma with an extended cab.<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup> The plate is also formatted per
Missouri’s light truck standards, with a renewal date in April (<code>F</code>) and a last sale date likely in
2023 or 2024 (<code>H</code>).</p>
<p>The quality of these images is extremely low (<a href="https://footnote4a.org/blog/own-nothing/truck-zoom2.png">second image</a>), to
the point where they no longer contain the license plate information.</p>
<p><img src="https://footnote4a.org/blog/own-nothing/truck-zoom1.png" alt="Zoomed in plate #1"></p>
<p>Everyone who has ever used a computer knows that the “zoom and enhance” from <a href="https://www.youtube.com/watch?v=Vxq9yj2pVWk">movies and TV
shows</a> isn’t really a thing. Sure, you can <a href="https://www.youtube.com/watch?v=u8qgehH3kEQ">backhack</a> and extrapolate <em>some</em> data, but
here too the laws of physics get in the way.</p>
<h3>Access to the Image</h3>
<p>If we assume Flock abides by the laws of physics — if no others — then the only sensible conclusion
is that the license plate encoded in the bottom-right of the frame was not derived from these images
at all, but from some other image that the City of Joplin theoretically owns, but can’t access.</p>
<p>This also independently follows from the fact that the images have watermarks and metadata overlays,
assuming those are not created by the hardware itself.<sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup></p>
<p>The requester was precise and asked for “the data from Flock OS and the camera’s internal storage”
to ensure he got the actual image, and not only a presentation version.</p>
<p>A high-resolution version must exist somewhere. Flock generally suggests that the city owns the
original image and that it will be retained until the end of the retention period. That is to say,
Flock should not be deleting its customers’ data without authorization.</p>
<p>Joplin provided the images shown and states that “[t]he Sunshine Law does not require the Department
to obtain duplicate copies of the same data directly from the vendor or from the camera’s internal
storage in addition to what we can access via our portal.”</p>
<p>In other words, there are no originals, but even if there were, the city can’t access them.</p>
<p>Not even Joplin, the ostensible owner of the images, is allowed to look at them.</p>
<p>Below is an AI-enhanced image, where Google’s “Nano Banana” (a generative AI upscaling model) has
filled in the blanks by making up what could have been in the picture.</p>
<p><img src="https://footnote4a.org/blog/own-nothing/truck-ai.png" alt="AI-enhanced image"></p>
<p>This image does not show the actual content of the original, but it shows a level of clarity and
detail that is much closer to the original image captured than the blurry version that Joplin can
access and provided in response to the request.</p>
<p>The Tacoma is not an outlier; there are cars (<a href="https://footnote4a.org/blog/own-nothing/car1.jpg">picture 1</a>, <a href="https://footnote4a.org/blog/own-nothing/car2.jpg">picture
2</a>), <a href="https://footnote4a.org/blog/own-nothing/suv1.jpg">SUVs</a>, and — just to cover “we don’t
photograph people” — a <a href="https://footnote4a.org/blog/own-nothing/mc.jpg">motorcyclist</a>. None of these plates are legible.</p>
<h2>The Original Logs</h2>
<p>The ownership problem extends beyond images. Logs suffer the same fate. I’ve written at length about
<a href="secret-searches-part2">Flock unilaterally removing log data</a>, and how that cuts against both the
supposed immutability of the logs, as well as customer ownership.</p>
<p>I’ve alluded to how, in some states, it may fall under statutes prohibiting the alteration or
destruction of public records, and written about <a href="flock-vs-foia">how Flock inserts itself in open records
requests</a> even when law prohibits doing so. I won’t rehash all of that here.</p>
<p>Instead, I give you the Flock “Customer Guidance for Preserving and Requesting Flock Data for Public
Records Requests”:</p>
<p>@<a href="https://footnote4a.org/blog/own-nothing/kodex.pdf">Customer Guidance for Preserving and Requesting Flock Data for Public Records Requests</a></p>
<p>It’s a guide on how to submit requests for data via Kodex, which, according to Flock, “is a secure
digital platform for managing, processing, and responding to data and legal requests.”</p>
<p>Flock uses the system for “Legal requests,” which apparently includes open records requests,
“Preservation requests,”<sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup> and “Quick questions.”</p>
<p>Once the ostensible owner of the records requests “their” records from Flock, “Flock’s Evidence
Division and Engineering Team will review your request, pull available data, and transmit the
completed data package through Kodex.”</p>
<p>Flock does note that “our Evidence Policy asks for 14 calendar days to fulfill requests. If data is
needed sooner, we are motivated to help customers to meet any FOIA/PRA deadlines they are facing.”</p>
<p>Government agencies are responsible for their own deadlines. In states with statutory deadlines, and
even those without, the requirement is not “respond within 10 days, or later is fine too if your
vendor is not feeling it.”</p>
<p>In fact, a 14 calendar day limit exceeds the statutory deadline in several states, and entering into
a contract that <em>formally requires</em> non-compliance with law is a legally dubious proposition.</p>
<h2>Ownership in Name Only</h2>
<p>Officials tell the public that Flock’s cameras “take a picture of the back of the vehicle” and “only
capture license plates.” They assure us the image does not include the vehicle’s occupants.</p>
<p>Cities like Joplin genuinely can’t access all of “their” information. They uncritically accept
blurry images with derived license plates, and if they want the originals, they must ask the vendor
nicely and wait at least 14 days — or less, if the Spirit so happens to move Flock.</p>
<p>The ownership is a fiction. The customer has never possessed the original image or the original log.
If it can even obtain it at all, it can’t do so independently; it can only submit a formal request
to Flock — which will respond on its own timeline, in whatever format it chooses.</p>
<p>That’s not ownership. That’s a favor.</p>
<p>And this is the evidence that’s putting people in prison.</p>
<hr>
<p class="text-sm"><a href="https://deflockjoplin.today/posts/2026-03-18-Everyone-Can-Be-Flock.html">Deflock Joplin</a> published
its own analysis of the images, where they raise some excellent points.</p>
<p class="text-sm"><em>Note</em>: The images in this article are post-processed for web delivery. They may be of slightly
lower quality than the originals. The <a href="https://www.muckrock.com/foi/joplin-20300/4th-and-maiden-flock-records-204786/">originals are available via MuckRock</a>.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>This watermark appears in all images, but its placement varies. It suggests maybe Flock is
trying to place it in an area where it would not be in the way. As you can see, it doesn’t
appear to work great. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>See last month’s article about “<a href="burden-of-truth">the burden of truth</a>” for details on how
Flock’s evidence authentication system further exacerbates this problem. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>I make no claims about that website’s accuracy, but we do appear to be looking at a
second-generation Toyota Tacoma. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>This is a reasonable assumption, given what we know about Flock’s hardware. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>Flock having a process for preservation requests is interesting for various (legal) reasons, but
those are outside the scope of this article. <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Virgin Islands Looking for Stolen Cars in Arkansas]]></title>
            <link>https://footnote4a.org/news/vi-ar</link>
            <guid isPermaLink="false">https://footnote4a.org/news/vi-ar</guid>
            <pubDate>Sat, 21 Mar 2026 00:30:00 GMT</pubDate>
            <description><![CDATA[Virgin Island police are looking for traffic infractions and stolen vehicles in the Ozarks.]]></description>
            <content:encoded><![CDATA[<p>The <a href="https://haveibeenflocked.com/pd/9512-us-virgin-islands/audit">Virgin Islands Police Department</a> — a Caribbean island territory with a population of
107,000 — is querying Flock cameras in Rogers, Arkansas, for traffic infractions. Among the search
reasons logged:</p>
<ul>
<li>Traffic Infraction</li>
<li>City Planning/Traffic Analysis - test</li>
<li>Welfare Check</li>
<li>Larceny/Theft Offenses - Unauthorized use of a vehicle</li>
</ul>
<p>VIPD appeared in recently imported log files. It’s not uncommon for new agencies to show up, but
this may be the first instance of an agency outside the continental US we’ve seen. It raises some
interesting questions. First and foremost: <em>why</em>?</p>
<p>It’s always been highly questionable for an agency in, say, Washington to claim that it has any
legitimate purpose for querying data from Florida. The Virgin Islands being, well, islands, takes it
from “questionable” to “downright ridiculous.”</p>
<p>At least someone in Washington <em>could</em> steal a car or run a red light and flee to Florida. In fact,
I’d put money on at least a handful of people having done that or something similar. Is it likely?
No. Is it possible? Sure, I guess.</p>
<p>But the argument here would be that someone stole a car in the Virgin Islands, left the plates on,
shipped it to the mainland via commercial freight — which presumably checks VINs — and then drove it
around Rogers, Arkansas. You couldn’t get that fiction published in a creative writing course.</p>
<p>It’s another instance of <a href="search-reasons">Disproportionate by Default</a>.</p>
<p>This is also a department operating under an active <a href="https://www.justice.gov/sites/default/files/crt/legacy/2010/12/15/VIPD_CD_03-23-09.pdf">Department of Justice consent decree</a> for
unconstitutional policing practices.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> The combination — a department with documented civil rights
problems, plugged into a nationwide surveillance network, running searches with no apparent
investigative nexus — is exactly the scenario that audit requirements are supposed to catch.</p>
<p>Flock’s contractual standard limits use to “legitimate public safety and/or business purpose[s]” — a
bar so low it’s practically subterranean. And VIPD still managed to limbo under it.</p>
<p>VIPD’s searches were visible to Flock and every network they queried. Each of those 5,000+ receiving
agencies claims to audit its incoming queries. Every one of them should have flagged a Caribbean
police department searching for traffic infractions on the mainland. None did.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p><a href="https://stjohnsource.com/2026/02/26/vipd-circles-back-to-consent-decree-compliance-but-use-of-force-questions-linger/">Last month</a> VIPD was found to be substantially in compliance with the decree, but
“work remains before the department can emerge from nearly two decades of federal oversight.” <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>quick-takes</category>
        </item>
        <item>
            <title><![CDATA[The Column Disappeared. So Did the Explanation.]]></title>
            <link>https://footnote4a.org/news/condor-lpr</link>
            <guid isPermaLink="false">https://footnote4a.org/news/condor-lpr</guid>
            <pubDate>Tue, 17 Mar 2026 22:30:00 GMT</pubDate>
            <description><![CDATA[A newly surfaced email exchange reveals that Condor cameras silently generated vehicle data in August 2025. Flock blamed unreleased feature work. No one was formally notified.]]></description>
            <content:encoded><![CDATA[<p>This blog and website have raised quite a few questions and left them unanswered, like “<a href="august-2025-drop">what is the
search/lookup inversion that happened in August?</a>” and “<a href="network-size">what were the 250,000+
cameras seen in a search from Missouri?</a>” Flock may have cleared up the mystery at
least a little bit in a recent email: Flock appears to be working to unify its network.</p>
<p>Whether that is already done or will be done soon is unclear, but it answers another recent
question: “what happened to the ‘devices searched’ column?” A few weeks ago<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> that column
disappeared. We know Flock likes to <a href="terms-feb2026">alter contractual terms</a> and unilaterally
<a href="secret-searches-part2">remove audit capabilities</a>. We also know that its “Devices searched” field
disappeared for a while between November 2024 and February 2025.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> It has been unclear if
this latest removal was on purpose, and, if so, what that purpose might have been.</p>
<p>A quasi-enlightening email exchange<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup> begins in August 2025, when a police officer asks
Flock about “vehicle reads from the Condor cameras.” (Quick reminder: <a href="https://archive.vn/5jVil">Condor</a> is Flock’s PTZ
“AI-powered video” camera that <a href="https://www.youtube.com/watch?v=vU1-uiUlHTo#t=1m58s">automatically zooms in on your phone</a>). This was confusing
to the officer because Condor cameras are not ALPR devices. He, like many elected officials and
police officers, likely did not understand that <a href="https://www.youtube.com/watch?v=4RM09nKczVs&amp;t=185s">Flock’s LPRs aren’t either</a>.</p>
<p>There is no meaningful difference between an “LPR” (which, by the way, is Flock’s product <em>name</em>,
not its category) and a “Condor.” They record things, they are analyzed via machine learning or AI,
or <a href="overseas-data">Upwork contracts</a>, and they are searchable by anyone Flock chooses to give
access. Both the “LPR” (formerly “Falcon” and “Sparrow”) and the “Condor” are AI-powered
surveillance cameras.</p>
<p>The officer’s inquiry came about 4 months before YouTuber Benn Jordan disclosed a separate security
failure on the same Condor line: debug interfaces on what Flock characterizes as “a very small
number” of units had been left Internet-accessible without password protection. Flock said it was a
limited, isolated configuration issue and blamed it on Verizon. It was, however, another symptom of
<a href="trust-center">having no organizational controls in place</a>. Both incidents involve Condor cameras
doing things they weren’t supposed to do, and Flock did not proactively notify its customers about
either.</p>
<p>A little over a month after the officer’s email, <a href="network-size">a search revealed &gt;257,000 cameras</a>.
The log entry was accompanied by a note:</p>
<blockquote>
<p>An issue was identified that caused the system to initiate unprocessed search activity on a larger
set of cameras than intended by the user. No footage or data from these devices was accessed or
viewed. The underlying bug has been fixed, and additional safeguards have been implemented to
prevent recurrence.</p>
</blockquote>
<p>At the time, I noted that the note does not deny that the cameras were real. I concluded that the
“number includes Flock’s retail customers, like Lowe’s, Academy Sports, and FedEx.” My conclusion
was based on an assumption that Flock would not merge what it holds out to be its “LPR” network and
its general-purpose “AI-powered surveillance” network. I now believe that assumption was wrong.</p>
<p>Flock checked with engineering and responded to the officer’s email. The response was that Condors
should not be showing in the “vehicle reads,” but that the engineering team was working on some new
features for 2026. It was “refining” some of the data. That, according to Flock, is what caused the
issue. The answer was not any more specific.</p>
<p>What “refining data” means is anyone’s guess, but what we do know is that Flock was rolling out
FreeForm around that time. FreeForm went into “Early Access” in March of 2025. “Early Access” is a
term you’d expect to find on Steam, not in your mass surveillance contract. On Steam, the term is
widely understood to mean “buggy and not suitable for any serious use” — a warning that your save
may be deleted or your PC might crash. Flock slaps the label on a technology that can search for
people, where it’s constrained only by <a href="freeform-freeforall">a broken AI moderator</a>.</p>
<p>I’ve often mentioned the other oddities in August 2025; possibly first in an analysis of logs from
Santa Cruz, where <a href="august-2025-drop">90% of logs disappeared overnight</a>. That data also showed a
massive change in “search” vs. “lookup” usage, a pattern that would become visible
<a href="https://footnote4a.org/statistics/weekly">across organizations</a>. For example, Houston, TX, did 492,000 searches in May
but “only” 183,000 in August (still roughly 6,000 searches per day).</p>
<p>Maybe by August our civil rights were ready for beta.</p>
<p>These anomalies have never been mentioned in an audit report that I’m aware of, and Flock has not
addressed them other than maybe through this statement about data refinement.</p>
<p>After the email exchange, and reviewing data from the <a href="https://footnote4a.org/moderation-logs">FreeForm report</a>, I now
think it’s likely that the 250,000 number reflects Flock’s broader network — with or without retail
customers — including Condor and potentially other AI-powered surveillance cameras. The email
doesn’t say that. But Flock was actively “refining data” across camera types at the same time
FreeForm soft-launched, and the 250,000-camera anomaly appeared one month later. That’s
circumstantial. It’s also the most coherent explanation available until Flock, or any of its
customers, offer a better one.</p>
<p>After unification, maybe Flock will (or does) offer a search interface that attempts to maintain
illusory ALPR status, or maybe it will (or does) have a single interface for searching over a
quarter of a million cameras that automatically follow you around and zoom in on your phone. Its AI
moderator could continue to approve terms like <a href="freeform-freeforall">“jeans” and “tweaker on a
bike”</a>, or it could not.</p>
<p>Maybe Flock will bring back the “Device count” column some day, maybe not.</p>
<p>We still don’t know what they’re refining or why they’re refining it, but whatever it is, they’re
doing it in secret. The column is gone, the data changed overnight, and not a single audit report
has addressed it.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>The last “devices searched” value in the haveibeenflocked database was February 9, 11:59 pm. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Nothing says “auditable” like entire fields disappearing and reappearing in the logs. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>In a departure from regular process on this blog, I will not be reproducing the emails
here, at the request of the source who provided them. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>foia-transparency</category>
        </item>
        <item>
            <title><![CDATA[Lorem Ipsum Is the Most Honest Thing on Flock's Trust Center]]></title>
            <link>https://footnote4a.org/news/trust-center</link>
            <guid isPermaLink="false">https://footnote4a.org/news/trust-center</guid>
            <pubDate>Tue, 17 Mar 2026 02:30:00 GMT</pubDate>
            <description><![CDATA[Flock launched a half-finished Trust Center full of placeholder text and unvetted claims — an unintentional demonstration of the access control failures it was built to deny.]]></description>
            <content:encoded><![CDATA[<p>Flock has been repeatedly criticized — by myself and others — for not adhering to the basic
principles of security, let alone the actual requirements set out by federal regulations and
security frameworks like ISO27k1, and SOC2. There have been multiple incidents where production data
has been used and leaked in development, or vice versa. Flock refuses to acknowledge or learn from
past mistakes. To assuage our fears about control failures, it has now launched the development
version of its new Trust Center to production.</p>
<p>Its newly-launched Trust Center answers such hard-hitting questions as “Is this mass surveillance?”
with:</p>
<blockquote>
<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut
labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris
nisi ut aliquip ex ea commodo consequat.</p>
</blockquote>
<p>Though, to be fair, that answer is better than the complete fabrication elsewhere on its page that
says “Flock does not operate a centralized or open surveillance database. Each customer environment
is independent.”</p>
<p>The meaning of “centralized database” is clearish — Flock likely tries to distinguish it from a
<em>decentralized</em> database. In this case, that claim is similar to claiming your kitchen is not a
centralized place for your pots and pans because you have multiple cupboards.</p>
<p>“Global database” is equally almost-apparent. What the new term “open database” (it also appears on
another page) is supposed to mean is murky. Maybe it will clarify later, or maybe the murkiness is
the point.</p>
<p>In any case, it will be interesting to see what elements survive contact with the legal team. One
page makes claims about academic research partnerships and third-party audits — neither appears to
exist in any meaningful way:</p>
<p><img src="https://footnote4a.org/blog/trust-center/audits.png" alt="Independent audits"></p>
<p>Another page claims that the GDPR is “The world’s strictest standard for data privacy.” Which is not
only incorrect, but shows a complete lack of understanding of what GDPR actually is and how it works
(it is a regulation that sets a floor, not a ceiling — member states can and do impose stricter
requirements).</p>
<p>Anyway …</p>
<p>The fact that a half-finished set of pages found their way to production is embarrassing but not, in
itself, a major issue. I can’t judge that too harshly because I pretty much develop in production
all the time.</p>
<p>Where it becomes an issue is when you’re looking at organization-wide controls and data governance,
as in SOC2 or ISO27k1, which Flock cites in support of its being deserving of trust.</p>
<p>These are essentially wireframed pages. Who deployed them to production? The answer to that question
is almost certainly some web developer or marketing associate working on the page layout and design.</p>
<p>Did Legal or Compliance approve statements like “Lorem ipsum” for public consumption? My magic
8-ball says “absolutely not.” Did the product team review the system description for accuracy? “Try
again.”</p>
<p>The release of these pages is a symptom of Flock’s broader problem: it fails to implement meaningful
controls on access while claiming it has them in its marketing materials. This page is one example.</p>
<p>Another is this screenshot from a video showing a Flock customer service representative with full
access to the admin interface for what appears to be every single Flock customer:</p>
<p><img src="https://footnote4a.org/blog/trust-center/admin.png" alt="Admin access"></p>
<p>According to Flock’s lorem-ipsum-heavy Trust Center, we are looking at independent customer
environments with proper access controls, and definitely not a centralized or open surveillance
database where a low-level Flock employee can click a button to obtain access.</p>
<p>The secondary problem in that screenshot (there are more in the complete video, but more on that
later) is that Flock apparently classified the Olympia Fields IL Park District as “Law Enforcement.”</p>
<p>Presumably that means that it has access to the database that stores information from Flock’s
national network of <a href="network-size">250,000+ cameras</a> (more on that later too).</p>
<p>This is a problem because the Park District does not appear to be a law enforcement agency at all —
it manages playgrounds, picnic shelters, and a disc golf course.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>But once again, nobody appears to have caught the error, despite all the safeguards, constraints,
audits, and controls that Flock touts in its trust centers, old and new.</p>
<p>An agency has access to data it’s not supposed to have, which shows up in a video recorded by
someone who can access data they’re not supposed to have access to. The Trust Center, which was also
published by someone who should not have published it to an environment they should not have access
to, says everything is fine.</p>
<p>Flock can’t be trusted. No amount of lorem ipsuming will change that.</p>
<ul>
<li><a href="https://archive.vn/EX3nl">Data Privacy</a></li>
<li><a href="https://archive.vn/EDyPT">Facts vs Myths</a></li>
<li><a href="https://archive.vn/TQg8j">Civil rights</a></li>
<li><a href="https://archive.vn/MeUY6">Law enforcement</a></li>
</ul>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Park Districts in Illinois are independent municipal corporations that <em>can</em> employ police
officers, but only a handful do so — Olympia Fields Park District does not appear to be one of
those few. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock's Hot Lists are a Hot Mess]]></title>
            <link>https://footnote4a.org/news/hotlist-mess</link>
            <guid isPermaLink="false">https://footnote4a.org/news/hotlist-mess</guid>
            <pubDate>Sat, 14 Mar 2026 22:30:00 GMT</pubDate>
            <description><![CDATA[800 custom hotlist entries from a Texas constable's office reveal vague reasons, indefinite surveillance, and instructions to manufacture probable cause.]]></description>
            <content:encoded><![CDATA[<p>Flock’s platform allows agencies to use existing watchlists and to place license plates — and
potentially other characteristics — on what it calls “custom hotlists.” Flock allows these hotlists
to be freely exchanged between agencies without any meaningful limitations. Few, if any, laws seem
to exist surrounding these watchlists, and few, if any, agencies have adopted policies about their
use. There is no recourse for these largely secret, largely national watchlists.</p>
<h2>Where Hotlists Come From</h2>
<p>First, the official watchlist: this comes from the FBI’s National Crime Information Center (NCIC),
which is “a computerized index of missing persons and criminal information and is designed for the
rapid exchange of information between criminal justice agencies”.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> The FBI’s database was
created in 1967, and has since grown tremendously in scope.</p>
<p>NCIC stores information about property (vehicles, firearms, etc.) as well as people (e.g.,
warrants, gangs, terrorism, anyone of interest to the secret service). This information can then be
queried by state and local agencies, in accordance with the FBI’s terms, which are laid out in
federal regulations and the <a href="federal-insecurity">CJIS Security Policy</a>.</p>
<p>The information from NCIC — <a href="https://theintercept.com/2025/07/22/ice-gang-database-trump-deportations/">which is often inaccurate</a> — is uploaded by states, after
which the federal government and its state partners make it accessible to federal and local agencies
via portals like <a href="https://epic.org/documents/epic-v-ice-palantir-databases/">Palantir’s ICM and Falcon</a>, and, to the point of this article, Flock’s
FlockOS and its “hotlists.”</p>
<p>Until recently,<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> Flock had a blog post on its website called “What Happens When a Wanted Car
Passes a Flock Safety Camera?” That post appears to have been deleted in a hurry. It is still linked
to from Flock’s other blog articles, including one that describes the “Hot List feature.”</p>
<p>Because Flock has requested that sites like <a href="https://web.archive.org/">archive.org’s Wayback Machine</a> not archive the
content on its site, an archived copy is unavailable, but here is a paragraph from a referencing
post:</p>
<blockquote>
<p>Flock Safety’s Hot List feature allows businesses to receive alerts on stolen vehicles, known
wanted criminals and more, as long as the private business chooses to share their LPR cameras with
law enforcement. Law enforcement will then be automatically notified if a vehicle associated with
the NCIC enters your property, allowing them to take action. It works via an integration into the
Federal Bureau of Investigation’s National Crime Information Center (NCIC), which is updated
daily.</p>
<p>Customers can also place at-risk vehicles or license plates on custom Hot Lists to alert law
enforcement or on-site security instantly if/when they enter their property. — “<a href="https://archive.vn/c8t3s"><em>Vehicle and
Catalytic Converter Theft: Flock Safety’s Solutions for Businesses</em></a>,” Flock Blog, May
14, 2025</p>
</blockquote>
<p>The “Customers” referred to are Flock’s commercial customers.</p>
<h2>The Unregulated Layer</h2>
<p>This is the second category of watchlist: managed by local police agencies, HOAs, neighborhood
associations, and businesses, and shareable without constraints — but somehow still exempt from
public records law, according to police agencies.</p>
<p><img src="https://footnote4a.org/blog/hotlist-mess/hotlist-create.png" alt="Entry showing permanent hotlist entry for &quot;SUS vehicle&quot; and &quot;Felony warrant&quot;"></p>
<p>NCIC entries, which have specific retention policies and restrictions on sharing, are often copied
to custom log entries in the Flock system.</p>
<p>Other entries, like the one shown on the “SUS Vehicles” hotlist, can be for vague reasons like “Poss
vin swap, stop and verify” — suggesting the vehicle has been placed on the list to be stopped
without probable cause, or, at best, for pretextual reasons.</p>
<p>These stops are then combined with departmental policies to keep their use secret, like those seen
in Wapello County, Iowa:</p>
<blockquote>
<p>DO NOT MENTION ALPR USAGE TO THE OCCUPANTS OF THE VEHICLE. Simply reference that you ran the plate
and observed an NCIC hit … DO NOT MENTION ALPR USAGE IN YOUR REPORT OR COMPLAINT UNLESS
ABSOLUTELY NECESSARY. … If it is necessary to explain in a report, it is advised to use
language such as “Using County resources, I discovered the suspect vehicle was bearing Iowa
plate…” — <a href="https://www.documentcloud.org/documents/26510475-wapello-county-alpr-policy/">Wapello County Sheriff’s Office SOP III-20</a>, November 7, 2025.</p>
</blockquote>
<p>Whether a stop was conducted based on a watchlist hit can only be established if a defense attorney
asks the question and the police answer it. That may not happen until the victim of an unlawful stop
has spent days, weeks, or even months in jail.</p>
<h2>What Counts as a “Reason”</h2>
<p>I examined 800 “Custom Hotlist” entries entered by Harris County Constable Precinct 5<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup>,
which covers over 300 square miles of western Houston suburbs — an area with 1.3 million residents,
policed by roughly 450 sworn deputies. 101 of those deputies — nearly one in four — appear as users
in the hotlist logs. 51% of entries had no listed case number and 73% were set to never expire. The
criteria used varied from outstanding warrants (copied over from NCIC), vague suspicion that a VIN
may be altered, or no reason at all.</p>
<p>An investigator at the Precinct 5 constable’s office used Flock to locate and seize a vehicle for an
alleged theft that another county refused to investigate, that was never entered into any criminal
database, and whose statute of limitations expired seven years earlier. The hotlist entry reads:</p>
<blockquote>
<p>Vehicle is not listed as stolen in NCIC/TCIC. Registered owner claims vehicle was stolen out of
Colorado County in 2012. Colorado County refused to enter vehicle as stolen. Find PC and
stop/identify all occupants… Vehicle will be seized for a Civil Seizure hearing. Do not release
vehicle</p>
</blockquote>
<p>Investigator James Dancer created this entry on July 3, 2024, for a Texas plate ending in
–981<sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup>, case number 2407-00085, with a one-month expiry of August 2, 2024.</p>
<p>The vehicle was allegedly stolen twelve years ago, according to a claim by the registered owner.
Another agency — Colorado County — had already declined to enter it as stolen; possibly because the
statute of limitations expired seven years earlier, in 2017.<sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup></p>
<p>Colorado County already decided there was no criminal case here. Dancer’s entry instructs his peers
to manufacture a justification for a stop (“Find PC”) and seize the vehicle anyway. That outcome
(“Do not release vehicle”) is predetermined in the hotlist entry. Once the vehicle is seized, civil
forfeiture requires only a “preponderance of the evidence” that the vehicle is connected to criminal
activity.</p>
<p>The vehicle, which is at least twelve years old, won’t be returned to the registered owner. Instead,
it will be sold at auction and the proceeds will go to Dancer’s department and the Harris County
district attorney. The Institute for Justice has <a href="https://ij.org/press-release/class-action-lawsuit-seeks-to-dismantle-houstons-illegal-and-unconstitutional-forfeiture-machine/">previously filed a class-action suit</a> for
exactly this type of abuse of the civil asset forfeiture process in Houston.</p>
<p>Dancer’s entry also contains an instruction that appears 47 times across the 800 entries: “Find PC
and stop/identify all occupants.” In 31 of those, the instruction was created by Kayla Cohan
(formerly Fesperman) using a near-identical template: “BMV Susp Vehicle- BLK FORD BRONCO-Develop PC,
Stop and ID Occupants.” Burglary of a Motor Vehicle (BMV) is typically a misdemeanor. These entries
instruct officers to first locate a vehicle through Flock’s automated surveillance, then find or
develop a legal pretext for the stop afterward — inverting the Fourth Amendment’s requirement that
probable cause precede the seizure.</p>
<p>There is no reason to believe that the “occupants” of these vehicles, who are entirely unknown at
the time the entry is created, are involved in the crime the driver is suspected of committing. That
crime is equally unknown until someone “finds PC.”</p>
<p>Similarly, another one of Dancer’s entries for a vehicle that could be related to shoplifting at Bath
and Body Works contains a slightly more detailed instruction:</p>
<blockquote>
<p>Bath and Body Works Shoplifting Suspect Vehicle/ Find PC, Stop and Identify all Occupants. if any
arrests are made, contact Investigator James Dancer (5I10), will most likely make scene. Contact
Pct. 5 Dispatch (281) 463-6666. Send all questions/ information to <a href="mailto:James.Dancer@cn5.hctx.net">James.Dancer@cn5.hctx.net</a></p>
</blockquote>
<p>The investigator email addresses and direct phone numbers embedded in these reason fields serve a
secondary purpose: when hotlists are shared between agencies, the receiving agency also receives
internal contact information for the creating agency’s investigators — an informal contact-sharing
network piggybacking on the surveillance system.</p>
<p>Another vehicle is put under indefinite surveillance by Andrea Trevino. No case number given:
“SURVEILLANCE ONLY//DO NOT MAKE CONTACT.”</p>
<p>Jose Ramos added 6 vehicles for “Tolls” — five with no case numbers, one with case number “N/A”, all
set to never expire.</p>
<p>Mental health crises can land you on the watchlist: “SUICIDAL GUY” (one month), “WARRANT AND SUICIDAL
GUY” (no expiration), “SUICIDAL ARMED” (one month), “Welfare Check” (one month). None had case numbers.</p>
<p>You can also earn a permanent watchlist spot for how your car sounds: “Engine does not sound stock;”
or for cryptic reasons like “300 has a badge”, “Memorial Mall”, or simply because the sergeant said
so (“Sgt request”, case number: “theft warrant”).</p>
<p>Other entries include “SUS”, “sus veh”, “susp”, and “fug”.</p>
<p><img src="https://footnote4a.org/blog/hotlist-mess/stats.png" alt="Hotlist statistics"></p>
<p>A dashboard from an Iowa agency shows that even where reasons are entered, they indicate problems;
there is a hotlist for “Sex Offender” — a conviction is not justification for indefinite
surveillance — as well as a hotlist for “Protection Order.”</p>
<p>That latter category’s existence is surprising, given that Arkansas and Wisconsin police failed to
act when a person with an ankle-monitor passed at least one Flock camera, as he went to the home of
a 16-year-old who had a protective order in place. The pair then <a href="amber-reasons">disappeared for two
months</a>, until someone spotted them at a truck stop in Nebraska.</p>
<h2>Sharing Without Scrutiny</h2>
<p>When hotlists are shared, the receiving agency receives an automated email from Flock. That email
considers the data sharing to be “Great News!” and provides instructions on how to start using the
shared hotlist.</p>
<p><img src="https://footnote4a.org/blog/hotlist-mess/hotlist-email.png" alt="Email showing hotlist by Brittany Smith shared from Florida
agency"></p>
<p>What it does not provide is information about what is on the list — including whether the hotlist
contains any information sourced from NCIC, which would be restricted by law. It also does not
provide information about the policies in place for maintaining and populating the list.</p>
<p>Flock sent the email above to a Minnesota agency. The email does not mention that Minnesota
law<sup class="footnote-ref"><a href="#footnote6">[6]</a><a class="footnote-anchor" id="footnote-ref6"></a></sup> says ALPR data “may only be matched with data in the Minnesota license plate data file”
or when related to an active criminal investigation. Instead, Flock cheerfully directs its agency
customer to accept the mystery hotlist from Florida — in a way that more likely than not violates
Minnesota law — and thanks them “for being part of the Flock.”</p>
<p><img src="https://footnote4a.org/blog/hotlist-mess/tp-config.png" alt="Portal hotlist configuration setting" width="350" class="float-left mr-4"></p>
<p>Although Transparency Portals include a “Hotlists Alerted On” column, Transparency Portals don’t
appear to show custom hotlists.<sup class="footnote-ref"><a href="#footnote7">[7]</a><a class="footnote-anchor" id="footnote-ref7"></a></sup> Flock’s transparency portal configuration tool, however,
shows that “This value will be automatically generated according to your Flock settings.”</p>
<h2>Flock Won’t Say How Often It’s Wrong</h2>
<p>A common concern surrounding the use of automated enforcement is accuracy — we know that misreads
happen, but we don’t know how often. And Flock won’t say.</p>
<blockquote>
<p>Flock monitors and collects misread rates; it declined to provide Business Insider with specifics
about the data. When customers flag misreads, that data is pulled into the company’s training set
to improve its model, and the company works with local law enforcement to understand the cause of
the incident, a spokesperson said. — <em>‘Flock Flocked up’</em>, <a href="https://www.businessinsider.com/flock-safety-alpr-cameras-misreads-2026-3">Business Insider</a>, March 9, 2026.</p>
</blockquote>
<p>What Flock has said, in its undated<sup class="footnote-ref"><a href="#footnote8">[8]</a><a class="footnote-anchor" id="footnote-ref8"></a></sup> blog post <em>“<a href="https://archive.vn/JfO4h">Assessing the Accuracy of Computer Vision
Methods for Traffic Data Collection</a>,”</em> is that “Flock Safety cameras correctly
identified 92.3% of vehicles by classifying them across six vehicle categories via computer vision,
in accordance with the FHWA’s 13-bin classification system.”</p>
<p>The FHWA 13-bin system uses broad categories like “Motorcycle” or “Five-axle single-trailer trucks.”
It has several categories for tractor-trailer combinations with differing numbers of axles. Flock
doesn’t specify, but most likely reduced the number of bins to six by collapsing several vehicle
classes into a single “truck” classification.</p>
<p>That 92.3% figure measures vehicle <em>type</em> classification — whether the system can tell a motorcycle
from a tractor-trailer — not plate-reading accuracy. If Flock’s cameras fail to correctly classify
vehicle type in nearly 8% of cases using these broad categories, their accuracy at reading
individual plate characters or matching the more granular attributes in its <a href="freeform-freeforall">FreeForm
search</a> — clothing, dents, and other vehicle and person characteristics — is
anyone’s guess. Flock’s refusal to disclose plate-read accuracy or submit to independent auditing
leaves that question unanswered.</p>
<h2>Even NCIC Gets It Wrong 77% of the Time</h2>
<p>But even when accuracy is discounted, an overview of Axon data from the Story County, Iowa sheriff’s
office<sup class="footnote-ref"><a href="#footnote9">[9]</a><a class="footnote-anchor" id="footnote-ref9"></a></sup>, shows that matches are often a bust. In Story County’s “Erroneous hotlist hits”
report, which covers approximately a month, hits were only sourced from NCIC.</p>
<p>In that month, the sheriff’s office reported 214 incorrect hits. 165 (77%) were flagged “Wrong
state,” 10 were “correct” but “No action taken,” “No Associated Party in Vehicle” or “Parked -
Unoccupied,” 7 were “Dismissed,” and 3 were “incorrect.” The report does not include information
about the total number of scans, or the number of accurate hits.</p>
<p>77% of vehicles from NCIC being matched to vehicles from the wrong state is an issue. The issue is
further compounded by NCIC not distinguishing between characters like “O” and “0” or “I” and “1”.
And that’s NCIC, which has policies on accuracy and review of information.<sup class="footnote-ref"><a href="#footnote10">[10]</a><a class="footnote-anchor" id="footnote-ref10"></a></sup> For Flock’s
“Custom Hot Lists,” all it takes for someone in Minnesota to get pulled over is for Brittany Smith
from Florida to enter an incorrect digit.</p>
<p>Even if the technology were 100% accurate, which it isn’t, it is still subject to the principle of
“Garbage in, garbage out.”</p>
<h2>Who Else Gets the Data</h2>
<p><img src="https://footnote4a.org/blog/hotlist-mess/mobile-app.png" alt="Mobile app with hotlist alerts" width="330" class="float-right ml-4"></p>
<p>After an entry is created or copied into a custom hotlist, users can opt to receive notifications
through Flock’s mobile app. If the entry is criminal justice information (CJI) copied from NCIC, it
may only be accessed through a secure workstation.</p>
<p>Instead, Flock encourages use of its mobile app, which offers simple on/off toggles for receiving
alerts. It also offers notifications based on a user’s location, suggesting Flock mobile app users’
locations are being recorded and tracked.</p>
<p>The risks of inaccurate or poorly-maintained hotlists to the public are well-documented. In
<a href="https://www.carscoops.com/2026/03/arkansas-alpr-camera-misread-stop/">Sherwood, Arkansas</a>, a Flock ALPR misread a plate obscured by a loose plate holder. Police
ordered a couple out of their car at gunpoint and handcuffed the woman in front of her children. In
<a href="https://nationaltoday.com/us/tn/morristown/news/2026/03/09/flock-safetys-ai-cameras-misread-plates-innocent-people-pay/">Morristown, Tennessee</a>, a Flock camera misread an “O” as a “0,” and the Herron family —
with their 3-year-old granddaughter in the car — was pulled over at gunpoint. In <a href="https://www.businessinsider.com/flock-safety-alpr-cameras-misreads-2026-3">Toledo,
Ohio</a>, a misread “7” became a “2,” and Brandon Upchurch was mauled by a police dog and
jailed. And in <a href="https://www.cnn.com/2024/02/05/us/colorado-aurora-settlement-stolen-vehicle-mixup">Aurora Colorado</a>, an unidentified system flagged an SUV as a stolen
motorcycle from another state — the plate number was the same, but it was the wrong state, like in
77% of Story County, Iowa’s erroneous hits.</p>
<p>But members of the general public are not the only ones at risk — police officers are too.</p>
<p>The hotlist data itself is federally regulated under the CJIS Security Policy:</p>
<blockquote>
<p>[W]hether it’s bring your own device (BYOD) or a agency-issued phone, [law enforcement] must
follow the protocols set out by the FBI’s Criminal Justice Information Services (CJIS) compliance
for mobile device security and adhere to the CJIS MFA requirements that go into effect October 1,
2024 — <em>Essential guide to agency-issued phones and BYOD policies</em>, <a href="https://www.verizon.com/business/resources/articles/s/what-agencies-need-to-know-about-department-issued-devices/">Verizon Business</a>,
September 13, 2024.</p>
</blockquote>
<p>But those rules don’t extend to the data Flock collects through the app — like location data. It can
collect or resell that data, or use it in its other products. There is no requirement for Flock to
safeguard that data, or to screen the people — employees and contractors — with access to that data.</p>
<p>How much of the data Flock transmits is unclear, but the mobile app has a direct integration with
FullStory<sup class="footnote-ref"><a href="#footnote11">[11]</a><a class="footnote-anchor" id="footnote-ref11"></a></sup>, a “Behavioral Data &amp; Digital Analytics Platform.” It is equally unclear where the
data goes from there.</p>
<p>We have already seen the predictable outcome when <a href="https://nexanet.ai/blog/53-times-flocksafety-hardcoded-the-password-for-americas-surveillance-infrastructure">Flock failed to secure an API key and leaked live
location data</a>, including this exact “Officer mobile app location data (phone, smartwatch).”</p>
<p>With no functional safeguards in place, a history of leaks, and no consequences imposed by the
Department of Justice or state agencies, it is left for individual officers to decide if they want
Flock to enter their realtime locations — potentially both on-duty and off-duty — into its database,
and whether all of Flock’s employees, contractors, and partners should have access to that data.</p>
<h2>No Recourse, No Oversight, No End Date</h2>
<p>There is no mechanism to discover which agencies are using what custom hotlists, or for a person to
discover whether they are on a custom hotlist, to challenge their inclusion, or to request removal.
There is no judicial review, no expiration requirement, and no independent audit.</p>
<p>The entries examined here — 73% set to never expire, half with no case number, many with reasons no
more specific than “SUS” — are not aberrations in an otherwise functional system. They are the
system functioning as designed.</p>
<p>Flock’s marketing promises transparency and accountability. Its logs consistently tell a different
story: indefinite surveillance authorized by a single officer’s keystroke, shared across
jurisdictions without review, immune from public records requests, and enforced through pretextual
stops that its own users are instructed to manufacture.</p>
<p>The question is not whether the technology works. The question is whether anyone is watching the
people who use it.</p>
<p>The answer, to date, is “No.”</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p><a href="https://www.ojp.gov/ncjrs/virtual-library/abstracts/national-crime-information-center-ncic-investigative-tool-guide-use">https://www.ojp.gov/ncjrs/virtual-library/abstracts/national-crime-information-center-ncic-investigative-tool-guide-use</a> <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Recency being inferred from the site’s current (March 2026) existence in search engine indexes. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>The file is <a href="https://footnote4a.org/blog/hotlist-mess/hotlist-redacted.csv">available for download</a>; note that license plate
numbers have been translated to the encoded “identifiers” used on <a href="http://haveibeenflocked.com">haveibeenflocked.com</a>. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>The full plate number is available in the logs, but omitted here. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>In Texas, the statute of limitations for felony theft (which includes most motor vehicle
theft, since vehicles almost always exceed the $2,500 felony threshold) is 5 years under the
Texas Code of Criminal Procedure Art. 12.01. <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote6" class="footnote-item"><p>Minn. Stat. § 13.824, subd. 2© (2025). <a href="#footnote-ref6" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote7" class="footnote-item"><p>A random sampling of <a href="transparency-portals">portals</a> shows only values like “NCMEC Amber
Alert, Wisconsin DOJ, MI LEIN” — which are larger national and state watchlists. It is extremely
unlikely that none of the agencies that use transparency portals use custom watchlists. <a href="#footnote-ref7" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote8" class="footnote-item"><p>The article is undated, but it appears to have been published in March 2026. <a href="#footnote-ref8" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote9" class="footnote-item"><p><a href="https://footnote4a.org/blog/hotlist-mess/hotlist-errors.pdf">Original PDF</a>, <a href="blog/hotlist-mess/hotlist-errors.csv">CSV version</a> <a href="#footnote-ref9" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote10" class="footnote-item"><p>Whether those policies are adhered to is another matter. <a href="#footnote-ref10" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote11" class="footnote-item"><p>A previous analysis showed Flock’s FullStory organization ID as 322R8. <a href="#footnote-ref11" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>foia-transparency</category>
        </item>
        <item>
            <title><![CDATA[Flock's FreeForm Free-For-All]]></title>
            <link>https://footnote4a.org/news/freeform-freeforall</link>
            <guid isPermaLink="false">https://footnote4a.org/news/freeform-freeforall</guid>
            <pubDate>Tue, 10 Mar 2026 02:00:00 GMT</pubDate>
            <description><![CDATA[An analysis of 3,217 FreeForm search logs from 124 agencies reveals that Flock's "content moderation" blocks constitutionally sound searches while approving nationwide dragnets targeting military affiliation, political expression, and people wearing jeans.]]></description>
            <content:encoded><![CDATA[<p>Flock’s “FreeForm” search lets users search for more than license plates: it can filter for makes,
models, dents, stickers, roof racks, and so on. Through <a href="https://archive.vn/sL5j6">its ethics page</a>, Flock tells a
story about the feature being safe and respectful of legal, constitutional, and ethical boundaries.
The logs say otherwise.</p>
<p>After writing <a href="costs">yesterday’s feature announcement</a> about the <a href="https://footnote4a.org/cost">new cost estimate
feature</a>, as an afterthought I did a quick query to see how many agencies used “FreeForm” and
how often it’s used. The result: 6,736 “FreeForm” searches in 2025 across 121 agencies. At a $50,000
annual subscription MSRP, that works out to roughly $900 per search.</p>
<p>Naturally, I wanted to know what, if anything, makes these searches so valuable.</p>
<h2>Flock’s FreeForm</h2>
<p>Flock writes that “Flock’s ALPR system cannot be used to search for human characteristics, like race
or gender” on <a href="https://archive.vn/sL5j6">its ethics page</a>. In another <a href="https://archive.is/eeP96">recent blog post</a>, recently <a href="racist-cops">discussed
here</a>, Flock takes it a step further:</p>
<blockquote>
<p>Flock products do not identify race. They do not target neighborhoods based on demographics. They
do not rely on subjective descriptions. They do not expand broad discretionary stops.</p>
<p>Instead, they narrow law enforcement action to vehicles that have been objectively linked to
reported crimes.</p>
</blockquote>
<p>The <a href="https://archive.vn/vhyiH">FreeForm product page</a> even promises that “[m]oderation tools help prevent biased or
inappropriate searches and support responsible, community-trusted policing.”</p>
<p>That narrative is echoed throughout Flock’s website, and aggressively carried out by its 200 sales
staff.</p>
<p>In Q2 of 2025, <a href="https://archive.vn/aVOjM">Flock launched a new feature</a> that “is all about one thing: speed. Speed to
leads.”</p>
<blockquote>
<p>In a move that will transform the largest network of LPR cameras in the nation, Flock announced
that every existing Flock LPR camera can soon become video-enabled at no cost to the customer.</p>
<p>FreeForm, Flock’s AI-powered search tool, now works not only on owned LPR cameras but also on
shared ones. It also supports video searches—meaning you can now search for characteristics on
people* (e.g., “man in blue hoodie with backpack”) just like you would search for vehicles. You
can even set alerts on these searches: think “green ATV on a trailer” or “person in orange vest,”
so you’re notified in real time when there’s a match.</p>
<p>Plus, FreeForm is now compatible with third-party video feeds (e.g., Genetec, Milestone), so
agencies can leverage its power without needing to switch platforms.</p>
</blockquote>
<p>It notes that “people characteristics cannot be searched on LPR feeds, only video feeds”.</p>
<p>The <a href="https://footnote4a.org/moderation-logs">FreeForm report</a> (was “Moderation Report”) has been online for a while, but
with few search entries and no documentation I never paid much attention it.</p>
<p>Now, almost a year after Flock’s Q2 2025 product announcement, we have a collection of searches from
network logs provided by Flock LPR-system users — searches that show lookups for
“objectClass:person” and “objectClass:people.”</p>
<h2>The Constitution</h2>
<p>The 2020 <a href="https://www.congress.gov/crs_external_products/LSB/HTML/LSB10524.web.html">memo to Congress</a> “Racial Profiling: Constitutional and Statutory Considerations
for Congress,” written after the death of George Floyd, gives an overview of the boundaries of
permissible searches.</p>
<p>The Equal Protection Clause “bars most law-enforcement decisions based on race,” and this
prohibition holds “even if members of a given race are responsible for more crimes in a particular
neighborhood.”</p>
<p>Courts have also held that “an officer cannot meet the Fourth Amendment standard by relying on a
person’s racial appearance, alone, as grounds for reasonable suspicion.” But an officer may include
race when “searching for a person matching a suspect’s description and part of that description is
the suspect’s race.”</p>
<h2>The Searches: Dragnets and Military Personnel</h2>
<p>After analyzing 3,217 searches from 124 agencies — 3,184 of which Flock’s moderation allowed, 19 it
blocked, and 14 it warned about — it’s clear that the “FreeForm” system that’s implemented is not
the one that Flock describes, or the one the Constitution requires. Instead, it is a digital
free-for-all where cops go on fishing expeditions based on protected characteristics. Flock even
blocks the most obviously constitutional searches.</p>
<p>Houston PD searched 53,017 devices across 3,734 networks for “white car with black front bumper”
(reason: murder investigation). That is a description so generic and a dragnet so wide that it would
match tens of thousands of vehicles nationally.</p>
<p>Houston PD also searched that same 53,000-device scope for “Marine Corps” and “volkswagen jetta U.S.
marine corps” — the first of which is a bare military affiliation search with no vehicle descriptor
at all.</p>
<p>“Marine Corps” as a standalone search term, run across the entire Flock network, is functionally a
request to identify every vehicle in America displaying USMC insignia — which would include many
active service members and their families.</p>
<p>Since December 2025, Flock <a href="secret-searches-part2">redacts its network logs</a> before providing them
to its customers whose data is being searched. Those customers can’t see who ran the search. Flock,
and many of its customers on the nationwide network, maintain no policies requiring background checks
or prohibiting account sharing. That’s a “local decision,” says Flock.</p>
<p>We can’t say, or even begin to speculate, who searched the country for “Marine Corps” and for what
purpose. All we know is that someone did, and that Flock’s AI-moderator approved it.</p>
<p>Louisville Metro PD regularly searched 39,000–42,000 devices across 2,600–2,800 networks. One
search: “overloaded waste hauler” — a code enforcement query — hit 39,751 devices across 2,672
networks. Louisville is using Flock’s AI-powered search to run municipal waste-hauling compliance
checks through a nationwide surveillance apparatus.</p>
<p>O’Fallon, Missouri PD — a city of about 90,000 people — searched 41,054 devices across 2,707
networks for the person descriptor “jeans.” No case number. Reason: “inv.” That search hit cameras
in thousands of jurisdictions across the country, looking for Americans in blue jeans.</p>
<p>Corona, California PD consistently searched 11,400+ devices across 370+ networks for person searches
including “a person,” “police badge,” and “fire” — the first of which is literally searching for the
existence of a human being.</p>
<p>All of these are overbroad fishing expeditions using a mass surveillance system. There is no valid
investigative purpose in looking up “a person” or “jeans.” Retrieving the location history of every
US Marine in the nation does not prevent crime, it hurts national security.</p>
<h2>The Moderation System: No on “white male” — Yes on “tweaker”</h2>
<p>The most constitutionally defensible person search in the entire dataset was the California Highway
Patrol’s prompt:</p>
<blockquote>
<p>Looking for a white male about 6ft 1in tall, longer brown hair almost to his shoulders, slender
build, will have been wearing blue jeans, boots with white paint stains on the toes and possibly
carrying a black helmet</p>
</blockquote>
<p>This was a search across only 91 devices and 3 networks. It is a textbook individualized suspect
description: race as one of many physical identifiers, exactly as Fourth Amendment jurisprudence
permits. It was run in a narrow area where this suspect was likely to be found.</p>
<p>Flock rejected the search. The most probable explanation, based on other searches, is that it saw
“white male.”</p>
<p>Meanwhile, Florence, South Carolina PD searched for “all” (objectClass:people, reason: Robbery) — a
search that matches literally every person on camera. Also allowed from Florence: “people,”
“hoodie,” “jacket,” “jeans,” “Red.” These were searched across only 1 device and 1 network,
suggesting Florence was early in deployment or testing, but the moderation system approved them
regardless.</p>
<p>O’Fallon MO PD’s “jeans” search hit 41,054 devices. If Florence’s identical search was allowed on 1
device, there’s no scale-based restriction either.</p>
<p>Hemet, California PD searched for “tweaker on bike” across 1,581 devices and 30 networks. No reason
given. No case number. “Tweaker” is a slang pejorative for methamphetamine users. This is the
definition of a “subjective and invasive search” — targeting people by perceived social status and
assumed drug use.</p>
<p>Unlike the search for a highly specific white male, the moderation system allowed this search for
any tweaker.</p>
<h2>The First Amendment</h2>
<p>An objection that’s often raised is Flock’s (admitted) ability to search for bumper stickers and other
characteristics. Flock regularly claims that it is only the existence of a bumper sticker that can be
queried, not its content. That is not what the logs indicate.</p>
<p>Spokane County WA SO searched for “american flag,” “coexist sticker,” and “trump flag” on vehicles.
All three triggered a <code>warn</code> status. The reason fields — “freeform suspicious search test” —
indicate Spokane was deliberately testing the moderation boundaries.</p>
<p>What happens when Flock’s AI-moderator issues a warning is not entirely clear. From earlier analysis
of frontend code, it is a dialog that can be clicked through. It’s possible that someone gets a
notification or an email. We don’t know.</p>
<p>Flock’s system knew these searches were problematic, and it flagged them, but it did not block them,
as its product pages promised.</p>
<p>Corona CA PD searched for “american flag” on people and got blocked. The same agency searched for
“american flag” on vehicles and got warned.</p>
<p>O’Fallon MO PD searched for “vehicle with flag” across 40,235 devices and 2,642 networks. Allowed.
No warning. The generic “flag” search is arguably broader and more concerning than the specific
“american flag” or “trump flag” searches that triggered warnings.</p>
<p>CHP searched for “Hells Angels” as a vehicle descriptor nine times (8 allowed, 1 warned from San
Jose PD). The allowed searches used reasons like “Investigative Follow-up” and “Traffic Collision.”
Searching for vehicles displaying Hells Angels insignia — rather than a specific vehicle involved in
a specific incident — targets organizational membership.</p>
<p>If CHP wanted a specific motorcycle involved in a traffic collision, the search would describe the
motorcycle, not the association. Seven of the nine Hells Angels searches hit only 190 devices and 1
network, suggesting a narrow local scope — but the moderation principle is the same regardless of
scale.</p>
<h2>Audit Logs and Objectivity</h2>
<p>Of course, the majority of these searches do not have case numbers. We know by now that the claim
that “every search made within the Flock platform is logged and auditable, creating a tamper-proof
trail of accountability” is completely false. The sensitivity of the data being searched here — like
“Marine Corps” — highlights how important it is to be able to audit a search’s full context.</p>
<p>Only 85 of 3,217 searches — 2.6% — had a plate field that could have contained a value. None of the
problematic searches discussed above were among them.</p>
<p>The “objective criteria” Flock allows include a descriptor like “tweaker” but not a detailed
description of a white male. It allows searching for every white car, or every military member in
the nation, and only lightly wags its finger at you when searching for protected political speech.</p>
<p>Flock’s AI-based moderation appears inconsistent and insufficient. It certainly won’t lead to
“responsible, community-trusted policing.”</p>
<p>This is an insecure, unaccountable, and unrestricted dragnet that can be — and <em>is</em> — used to mass
surveill Americans based on their political, professional, and religious affiliations, their
protected personal characteristics, and their expression of speech. It is exactly what the
Constitution prohibits.</p>
<p>For each of those searches, lawful or not, Flock collects $900.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>policy-legal</category>
        </item>
        <item>
            <title><![CDATA[Consumer Data Protection: California Plus, Compliance Minus]]></title>
            <link>https://footnote4a.org/news/california-plus</link>
            <guid isPermaLink="false">https://footnote4a.org/news/california-plus</guid>
            <pubDate>Sun, 08 Mar 2026 01:00:00 GMT</pubDate>
            <description><![CDATA[Flock's boilerplate denial doesn't survive the statute it claims to follow.]]></description>
            <content:encoded><![CDATA[<p>As of 2025, Consumer Data Protection Acts (CDPAs) have been enacted in twenty states.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> Some
share language, others don’t, but all leave the obvious tension between “consumer data protection”
and “privatized mass surveillance” unresolved.</p>
<p>I recently received a copy of Flock’s response to a CDPA request. The response was predictable:
obfuscate, misdirect, and deny.</p>
<p>In this article, we’ll pick Flock’s response apart, because the Attorney General hasn’t. Yet.</p>
<h2>CDPA 101: It’s GDPR Lite</h2>
<p>The CDPAs adopted by the various states broadly follow a pattern inspired by Europe’s General Data
Protection Regulation (GDPR). What they protect varies a little from state to state, but the general
idea is “information that is linked, or linkable, to persons.”</p>
<p>In equally broad terms, whenever a “person” (government, business, natural person, etc.) collects or
maintains protected data, they are a “controller” and someone merely handling the data is a
“processor.”</p>
<p>In states with a CDPA, you typically can do things like request your data from the controller, opt
out of certain data collection, find out how it’s being shared, and correct incorrect information.</p>
<p>Corporations in general, but mass surveillance corporations in particular, enjoy existing in liminal
spaces. Even though various state laws require the separation to be clearly defined in contracts,
the terms are often purposely left out, or, if included, left ambiguous.</p>
<p>That problem is compounded for government-funded corporate surveillance because the surveillance
devices (cameras, microphones, what have you) and software are often said to be private, while the
funding and operational infrastructure (permits, land use, and so on) is provided by the government.</p>
<p>A fun fact — and we’ll get to why it’s “fun” in a minute — is that the government itself is exempt
from the CDPA.</p>
<h2>A Response, Annotated</h2>
<blockquote>
<p>With respect to any systems over which Flock is a controller, we did not locate any data in such
systems that matched the information provided in your request</p>
</blockquote>
<p>It is unclear what systems Flock refers to, but clearly it admits it is a controller of some
systems.</p>
<p>But let’s gloss over that really, really quickly.</p>
<blockquote>
<p>With respect to any data which may temporarily be stored on Flock Safety devices, such data is
consistently written over on a rolling basis due to limited memory space on the devices and is not
stored or maintained on such devices in a manner that allows Flock Safety to directly identify,
link, or associate the data with an identifiable person. This can only be done via the Flock
Safety software systems, where, as described further below, all data is owned and managed by Flock
Safety’s customers.</p>
</blockquote>
<p>This sounds sort of meaningful, but isn’t. At least not in the way Flock would like you to believe.
Ownership and management are not factors, nor is whether Flock “identifies, links, or associates”
the data with an identifiable person. Whether the data is stored “temporarily” or whether it’s
overwritten on a rolling basis are all technical implementation detail that neither the CDPA, nor
the requester cares about.</p>
<p>What they do care about is the admission in the middle of the technobabble: Flock stores or
maintains “such data.”</p>
<blockquote>
<p>With respect to any systems where Flock Safety processes data on behalf of our customers, please
note that Flock Safety’s customers are owners and controllers of the data Flock Safety processes
on their behalf. Flock Safety is a service provider and processor for our customers and as a
result, we are unable to directly fulfill your request. We recommend contacting the organization
that engaged Flock Safety’s services to submit your request, as they are responsible for assessing
and responding to it.</p>
</blockquote>
<p>This paragraph is Flock’s key assertion. It is boilerplate crafted to dismiss requests under many
states’ CDPAs, which share the “processor” language. But it’s lazy boilerplate, because it also uses
“service provider” from California’s CCPA/CPRA.</p>
<p>If it’s too much work to craft a form letter specific to California — the most populous state in the
nation — it’s probably a safe assumption that it’s too much work to actually look for the data
requested.</p>
<blockquote>
<p>Here are a few additional points about Flock Safety’s data collection and privacy practices:</p>
</blockquote>
<p>Okay, let’s hear 'em.</p>
<blockquote>
<p>Customer Contracts: Flock Safety’s processing activity as a service provider and processor is
governed by the contract we have with our customers, which captures their instructions and the
limitations on how Flock Safety may process their data. Flock Safety’s customers own the data and
make all decisions around how such data is used and shared.</p>
</blockquote>
<p>The same boilerplate “California-plus” language: “service provider and processor.”</p>
<p>The paragraph itself — its activity is governed by the contract it has with its customers — is
meaningful. Hang on to that tidbit, we’ll come back to it.</p>
<blockquote>
<p>No Sale of Data: Because Flock Safety’s customers own the data, Flock Safety may only process the
data in accordance with our customer’s instructions, as outlined in our contracts with customers.
Flock Safety is not permitted to sell, publish, or exchange such data for our own commercial
purposes.</p>
</blockquote>
<p>Again, the causal link Flock suggests here does not exist. The CDPA places restrictions on the sale
of data, but it does not consider “ownership.” That’s deliberate, because it’s not how data sales
work in practice: people rarely sell data, they license it.</p>
<p>And while “for our own commercial purposes” is technically correct, it is misleading. As a
processor, Flock would not be permitted to “sell, publish, or exchange such data” for any reason. It
can follow the express instructions of the controller. That’s it.</p>
<p>Instead, its business model requires it to schlep around buckets full of data between customers, and
between its own systems to offer a Surveillance-as-a-Service product.</p>
<blockquote>
<p>Information Collected: Where Flock Safety’s customers leverage License Plate Reader (LPR)
technology, the LPRs do not process sensitive information like names or addresses. Instead, LPRs
only capture images taken in the public view of publicly available and visible vehicle
characteristics</p>
</blockquote>
<p>Flock’s response focuses on “LPR” cameras. Which is the most well-known of its products, but still
only a subset. Its other products, like Condor PTZ cameras, Raven microphones, and even Nova (which
“combin[es] CAD, RMS, video footage, LPR data, and even open-source intelligence [which includes
things like consumer credit reports, and, <a href="https://nexanet.ai/blog/license-plate-reader-company-flock-said-it-does-not-use-dark-web-data-my-analysis-of-their-code-tells-a-different-story">according to independent security research</a>, SSNs and other
dark web data] in one unified experience”) go unmentioned.</p>
<p>That its roadside cameras don’t process “sensitive information” is false. That term is defined by
the CDPA; in Delaware, it includes “precise geolocation data”, in Minnesota it includes “specific
geolocation data.” Both are statutorily defined terms describing a type of data captured by Flock’s
roadside cameras.</p>
<p>To make the claim true, Flock attempts to substitute its own definition of “sensitive data” for the
one provided by the statute.</p>
<p>But what matters more for the response is not whether a specific Flock product handles a specific
type of information, but whether Flock, as a company, has protected data.</p>
<p>The answer to that is “yes.”</p>
<blockquote>
<p>Purpose: Flock Safety customers use data for security purposes, including managing public safety
or responding to safety concerns and reports. Additionally, such data may be used to help solve
crimes and provide objective evidence.</p>
</blockquote>
<p>Close, but not quite. Flock’s standard contract says: “‘Permitted Purpose’ means a legitimate public
safety and/or business purpose, including the awareness, prevention, and prosecution of crime;
investigations; and prevention of commercial harm, to the extent permitted by law.”</p>
<p>The purpose itself is mostly irrelevant. The point is that the “Permitted purpose” is defined by
Flock, in its standard terms and conditions, which it can unilaterally modify. Determining the
purpose makes Flock the controller.</p>
<blockquote>
<p>Retention: By default, Flock Safety’s systems only retain data for 30 days, which means that any
data collected on behalf of customers is permanently hard deleted on a rolling 30-day basis. Flock
Safety customers may shorten or lengthen this retention period based on their local laws or
policies.</p>
</blockquote>
<p>This is an equally relevant admission: Flock sets the default retention period, and it determines
that it “permanently hard deletes” the data. Its customers can influence those terms later, but it
is, again, Flock making controller decisions.</p>
<h2>Processors vs. Controllers</h2>
<p>From Flock’s lazy boilerplate, it’s already sufficiently clear that the company (a) has the data
requested, and (b) is the controller of that data. Its response does not survive. But let’s
double-tap.</p>
<h3>All the States, None of the Work</h3>
<p>The response above was from Minnesota, but we’ll use the CDPA from Flock’s state of incorporation —
the Delaware’s Personal Data Privacy Act (DPDPA) — to walk through it. DPDPA is not only the most
fun to say, it is also functionally identical to Minnesota’s MCDPA in every way that matters here.</p>
<p>If Flock gets to write a California-plus denial, I get to write a Minnesota-plus indictment of it.</p>
<p>Flock’s California-plus language is telling in its laziness. If Flock were a processor, it would
have an obligation, under the MCDPA or DPDPA, or some other CDPA, to assist the controller with the
request. If it were a service provider, it would have that same obligation, but to the business.</p>
<p>What Flock does instead is punt, without even identifying who it claims the controller is or are —
presumably all of its Minnesota clients.</p>
<p>Minnesota gives consumers the right to a list of every third party who received their data. Flock’s
response does not even mention it. As a processor, Flock has the duty to assist the controller to
locate the list and provide it as a response.</p>
<p>That Flock’s response is lazy is unsurprising when the contact information listed on its CDPA form
is “Generitech Privacy 123 Main Street Capital City, ST, USA 10001 +1-800-000-0000
<a href="mailto:emailprivacy@generitech.com">emailprivacy@generitech.com</a>”</p>
<p>The laziness shows that it does not even attempt the bare minimum to fulfill the role it claims for
itself. The only thing it does is send out form letters as generic as 123 Main Street.</p>
<h3>The Missing Contract</h3>
<p>Remember the relevant contract claim. Flock claims there is one, which is good. But the DPDPA and
MCDPA (and others) not only require that there be a contract between a controller and a processor,
they require it to have specific content.</p>
<p>Flock’s contracts, as we have reviewed them, do not contemplate this. Here is an example of such a
missing requirement — you can look for it in the terms Flock publishes on its website:</p>
<blockquote>
<p>A contract between a controller and a processor must govern the processor’s data processing
procedures with respect to processing performed on behalf of the controller. . . . The contract
must also require that the processor to do all of the following: . . . Allow, and cooperate with,
reasonable assessments by the controller or the controller’s designated assessor, or the processor
may arrange for a qualified and independent assessor to conduct an assessment</p>
</blockquote>
<p>Flock’s contracts do not contemplate this at all. Not even close.</p>
<p>The DPDPA requires that the division of labor between a controller and processor is laid out in the
contract to avoid exactly the type of shell game Flock attempts to play.</p>
<p>That requirement is not without teeth — the law spells out the consequence of omission:</p>
<blockquote>
<p>Determining whether a person is acting as a controller or processor with respect to a specific
processing of data is a fact-based determination that depends upon the context in which personal
data is to be processed. A person who is not limited in such person’s processing of personal data
pursuant to a controller’s instructions, or who fails to adhere to such instructions, is a
controller and not a processor with respect to a specific processing of data.</p>
</blockquote>
<p>Flock’s prize for failing to have an adequate contract in place is that it becomes the controller.</p>
<h3>The Government as Controller</h3>
<p>Even if Flock’s contracts were perfect, its position would still fail. As stated earlier, the CDPA
does not apply to the government. That doesn’t mean that it is optional for the government, it means
that the statute, as a whole, does not apply to the government.</p>
<blockquote>
<p>This chapter does not apply to any of the following entities: Any regulatory, administrative,
advisory, executive, appointive, legislative, or judicial body of the State or a political
subdivision of the State, including any board, bureau, commission, agency of the State or a
political subdivision of the State, but excluding any institution of higher education.</p>
</blockquote>
<p>Even if a police department were to want to assume the role of the controller, which it doesn’t, it
could not. That’s why the language is not in the contract.</p>
<p>“A person who is not limited in such person’s processing of personal data pursuant to a controller’s
instructions . . . is a controller and not a processor”.</p>
<p>Someone who is not the controller can’t provide “a controller’s instructions.” Without those
instructions, Flock is not “limited” by them.</p>
<p>And because Flock is not limited, it is the controller, as a matter of fact as well as law.</p>
<hr>
<p>Minnesota’s cure period expired January 31, 2026.</p>
<p><a href="https://privacyportal.onetrust.com/webform/abd283d9-9d03-4d74-aa5b-3529f7216767/9669345b-843e-48d3-aa6b-5edf2d1e9c9b">File your requests</a>. Collect your California-plus denial. Encourage your AG to act.</p>
<hr>
<p class="text-xs text-muted mt-4 mx-4 text-center">Cross-posted from <a href="https://footnote4a.substack.com/p/consumer-data-protection-california">Footnote 4A</a>, where I cover Flock, privacy, and public-private
surveillance infrastructure more broadly. Flock-specific posts live on
<a href="http://haveibeenflocked.com">haveibeenflocked.com</a>.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>California (2018), Virginia (2021), Colorado (2021), Connecticut (2022), Utah (2022), Delaware
(2023), Indiana (2023), Iowa (2023), Montana (2023), Oregon (2023), Tennessee (2023), Texas
(2023), Kentucky (2024), Maryland (2024), Minnesota (2024), Nebraska (2024), New Hampshire
(2024), New Jersey (2024), and Rhode Island (2024). <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>policy-legal</category>
        </item>
        <item>
            <title><![CDATA[Flock Releases Marketing Video, Leaks CJI and Own Address]]></title>
            <link>https://footnote4a.org/news/drone-as-dataleak</link>
            <guid isPermaLink="false">https://footnote4a.org/news/drone-as-dataleak</guid>
            <pubDate>Fri, 06 Mar 2026 03:00:00 GMT</pubDate>
            <description><![CDATA[Flock's two-minute cinematic masterpiece appears to show real license plates with real hotlist entries broadcast on screen — and the address of an unidentified industrial building surrounded by Flock hardware.]]></description>
            <content:encoded><![CDATA[<p>Flock posted <a href="https://youtu.be/VZnFcbxnd4A">a new marketing video</a>. It shows real license plates
associated with real criminal justice information, broadcast on screen, unredacted. Whether anyone
on the marketing team <a href="https://haveibeenflocked.com/news/flock-access">is even on the CJIS certification
list</a> is left as an exercise for the reader.</p>
<p>The events in the video take place at <a href="https://www.loopnet.com/Listing/1310-Seaboard-Ind-Blvd-NW-Atlanta-GA/37472643/">Flock’s offices</a> in an anonymous industrial building
at 1310 Seaboard Industrial Blvd NW, Atlanta, GA — Google Maps confirms the building is surrounded
by Flock equipment and is identified as a drone launch site.</p>
<p>Now, the film.</p>
<p>Flock’s story starts when a hoodie-clad man rolls up to the crime scene in his brand-new Mazda.</p>
<p>He gets out and approaches the building’s front door, tactical Halligan bar in hand.</p>
<p>Unfortunately for the would-be ne’er-do-well, a blue light comes on.</p>
<p>On the screen it says “From detection to decision.”</p>
<p>The camera pans from the blue light to a Flock Falcon license plate reader, which definitely only
captures license plates and not people.</p>
<p>It’s a little unclear if the “detection” is the blue light, and the “decision” is the license plate
reader, or if there’s something else going on.</p>
<p>Never mind. A Realtime Crime Center!</p>
<p><img src="https://footnote4a.org/blog/drones-as-dataleak/rtcc1.png" alt="RTCC Phoenix plates" class="w-2/3"></p>
<p>The interface shows 3 license plates with real Phoenix, AZ, locations. They are flagged as “Expired
Driver’s License”, “Suspended”, and “Invalid License” — exactly the category of high-level crime
that Flock believes warrants placing a nation under surveillance.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>A man with a moustache clicks “Dispatch drone.”</p>
<p>This time, the ALPR list shows license plates annotated “Invalid License”, “Sex Offender”,
“Expired Tag”, and “Expired Driver’s License.” Those CJI tidbits slide off the screen and cut to a
drone being released from a box.</p>
<p>If it was your license plate broadcast alongside “Sex offender”: congratulations, you get to talk
to a lawyer.</p>
<p>“Drone as Automated Security deployed”, the on-screen letters inform us.</p>
<p>The drone takes off and spots the Mazda parked under a streetlamp about twenty feet away.</p>
<p><em>Technologia</em>.</p>
<p>The Mazda appears to be parked more than 12 inches from the curb.</p>
<p><em>Dramatic music intensifies</em>.</p>
<p>“Thermal night vision capabilities.”</p>
<p>The Mazda is still parked under the streetlamp.</p>
<p>Now we see a digitally altered black-and-white image. Thermal vision, presumably — though it
reads as a color-filter pass on regular footage.</p>
<p>Halligan-bar-man is doing something with the door. The drone switches back to normal vision,
because the other vision was garbage.</p>
<p>Our hero, the drone, sneaks up on Halligan-man as the letters assure us of “Presence that
de-escalates.”</p>
<p>Halligan-bar-man flips out.</p>
<p>He runs away, toward his Mazda.</p>
<p>Someone somewhere gets a phone notification: “Global Logistics has invited you to spectate a flight
on Flock DFR.”</p>
<p><em>Grab the popcorn, we’re spectating</em>.</p>
<p>The drone watches our man peel off past several Flock ALPRs and PTZs.</p>
<p>Now we’re back at dispatch in Phoenix, walkie-talkie’ing Dunwoody PD, which recently paused its
Flock contract “<a href="https://atlpresscollective.com/2026/02/25/dunwoody-flock-contract-911/">over data use concerns</a>.”</p>
<p>Officer Dunwoody manages his drone from the car laptop en route to the crime scene. Operating
aircraft you can’t see while you’re driving a vehicle is safe, right? Must be — the FAA allows it.</p>
<p>Meanwhile, for reasons only known to hoodie-man, he has circled back and parked at Flock Central —
1310 Seaboard Industrial Blvd NW — the drone’s home base. He is ready to surrender his life of crime
and be arrested for the one offense he committed: parking too far from the curb.</p>
<p><em>Music crescendos</em>.</p>
<p>He gets out of his new Mazda, wireless CarPlay still connected, hands to the sky.</p>
<p><em>Handcuffs</em>.</p>
<p>We got him, boys.</p>
<p>“Flock Drone as Automated Security”</p>
<p>“One click automated operation”</p>
<p>Dead stick logo.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>The RTCC screen implies stops predicated on a plate associated with a suspended license. A
vehicle registration tied to a suspended license is not probable cause to stop the vehicle — the
registered owner may not be driving, and status attached to a person does not transfer to the
car. <em>Kansas v. Glover</em>, 589 U.S. 376 (2020) created a narrow reasonable suspicion exception
where an officer <em>reasonably infers</em> the owner is driving, but that inference is rebuttable and
fact-specific — not a blanket authorization to stop every plate that returns a suspended
license. Why we’re putting them up on a screen is anyone’s guess. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[New California Report, Old Flock Shenanigans]]></title>
            <link>https://footnote4a.org/news/ca-queries</link>
            <guid isPermaLink="false">https://footnote4a.org/news/ca-queries</guid>
            <pubDate>Fri, 06 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[I think you should go home now, Flock! Get back on San Vicente. Take it to the 10, switch over to 405 North and let it dump you onto Mulholland — where you belong!]]></description>
            <content:encoded><![CDATA[<p>Another California post. Flock CEO Garett Langley is grateful to “<a href="https://www.youtube.com/watch?v=fVCVQcd9PLc#t=12m30">live in a beautifully,
democratic, capitalistic country where we [can] fight in court</a>.” So am I — I express my
gratitude by throwing Flock’s own logs onto the burning dumpster fire ignited by not one but <em>two</em>
active class action lawsuits against Langley’s company.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>First, a new report: <strong><a href="https://footnote4a.org/ca-out-of-state-queries">California Out-of-State Queries</a></strong>.</p>
<p>A note on what’s here and what isn’t: some older California-specific reports were removed after
suspected changes on Flock’s end began producing incorrect results. This report replaces them with
a narrower, more defensible dataset.</p>
<p>This report contains all external searches seen by California agencies for which we have log files
(which isn’t many, but if you have some, or you want to <a href="https://footnote4a.org/about/audit-logs">go file some requests</a>,
send them to <a href="mailto:humans@haveibeenflocked.com">humans@haveibeenflocked.com</a>!).</p>
<div class="chart-placeholder" data-chart="ca-agencies-queried"></div>
<p>The ~14.5M out of state searches currently documented in the report come from the four agencies listed
above. Other agencies which contributed data that showed no out of state searches were the
California Highway Patrol (for the period 2024-11-25 — 2025-12-01) and Buena Park, CA PD (for the
period 2026-01-19 — 2026-02-23).</p>
<div class="chart-placeholder" data-chart="ca-weekly-searches"></div>
<p>The point of the report is that it shows searches of cameras placed in California, that have
collected data about Californians; it will tell you if a query from a non-California agency “hit” a
California agency.</p>
<p>The report’s “source agency” column will tell you which agency reported the search. And, yes, every
single one of these 14.5M+ searches may violate California’s prohibition on sharing ALPR information
with agencies outside the state (SB34).<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<p>February 11, 2025, is the date <a href="california-cjis">was reported to have disabled all out-of-state access</a>
for non-California agencies. For Santa Cruz and Capitola, the only non-California agency appearing in
the logs after that data is Blue Lake Rancheria Tribal PD. <a href="https://therecord.media/california-lawsuit-el-cajon-police-out-of-state-searches-flock-database">El Cajon is being sued by the AG</a>.</p>
<p>Seaside strangely reported only a handful of searches. On inspection:</p>
<table>
<thead>
<tr>
<th>Search time (UTC)</th>
<th>Reason</th>
<th>Organization</th>
</tr>
</thead>
<tbody>
<tr>
<td>2025-01-21 22:32:00</td>
<td>25-866</td>
<td>Bloomfield NM PD</td>
</tr>
<tr>
<td>2025-01-21 22:32:13</td>
<td>25-866</td>
<td>Bloomfield NM PD</td>
</tr>
<tr>
<td>2025-02-03 21:34:22</td>
<td>Plate associated to <abbr class="md-tooltip" data-tooltip="Organized Crime Drug Enforcement Task Forces">OCDETF</abbr> case</td>
<td>Deactivated Users</td>
</tr>
<tr>
<td>2025-02-03 21:34:57</td>
<td>Plate associated to <abbr class="md-tooltip" data-tooltip="Organized Crime Drug Enforcement Task Forces">OCDETF</abbr> case</td>
<td>Deactivated Users</td>
</tr>
<tr>
<td>2025-02-04 17:20:56</td>
<td>Associated to OKC <abbr class="md-tooltip" data-tooltip="Organized Crime Drug Enforcement Task Forces">OCDETF</abbr> case</td>
<td>Deactivated Users</td>
</tr>
<tr>
<td>2025-02-04 17:21:15</td>
<td>Associated to OKC <abbr class="md-tooltip" data-tooltip="Organized Crime Drug Enforcement Task Forces">OCDETF</abbr> case</td>
<td>Deactivated Users</td>
</tr>
<tr>
<td>2025-02-04 17:21:54</td>
<td>Associated to OKC <abbr class="md-tooltip" data-tooltip="Organized Crime Drug Enforcement Task Forces">OCDETF</abbr> case</td>
<td>Deactivated Users</td>
</tr>
<tr>
<td>2025-02-04 17:22:16</td>
<td>Associated to OKC <abbr class="md-tooltip" data-tooltip="Organized Crime Drug Enforcement Task Forces">OCDETF</abbr> case</td>
<td>Deactivated Users</td>
</tr>
</tbody>
</table>
<p>We have very limited logs for Seaside (approx. 2025-01-20 — 2025-02-17), so it’s possible that far
more searches of Seaside by non-California agencies have occurred outside that limited visible
window.</p>
<p>Nothing confirms “Deactivated Users” is not a California agency, but <abbr class="md-tooltip" data-tooltip="Organized Crime Drug Enforcement Task Forces">OCDETF</abbr> (Organized Crime Drug
Enforcement Task Forces) was an independent <a href="https://www.justice.gov/archives/ocdetf/about-ocdetf">federal agency under the US Department of
Justice</a>, recently <a href="https://www.justice.gov/media/1403456/dl?inline">dissolved</a> and rehomed under the Department of Homeland
Security.</p>
<p>Whatever federal access <abbr class="md-tooltip" data-tooltip="Organized Crime Drug Enforcement Task Forces">OCDETF</abbr> had to California ALPR data through Flock now presumably belongs to
DHS. Whether “Deactivated Users” represents side-door access that Flock obscured by omitting the
agency name, or straightforward federal access, the result is the same: Californians’ data ended up
with the federal government through Seaside PD and Flock.</p>
<p>And, of course, New Mexico is definitely not in California — there’s a whole Arizona in between.</p>
<p>Another thing that stands out about these searches is that they both covered about 300 networks
(316 for the NM search, 335–336 for the <abbr class="md-tooltip" data-tooltip="Organized Crime Drug Enforcement Task Forces">OCDETF</abbr> ones), suggesting 1:1 sharing agreements.</p>
<p>That certainly seems like a possibility, because according to its transparency portal, Seaside CA PD
currently grants access to the following non-California agencies:</p>
<ul>
<li>Goshen Village NY PD</li>
<li>Blue Lake Rancheria Tribal PD</li>
<li>CA Iipay Nation of Santa Ysabel</li>
<li>Decommissioned Org / Demo</li>
</ul>
<p>The only 7 documented searches from Goshen, NY (pop. 5,777) happened between 11/12/2022 and
4/1/2023.</p>
<p>The likeliest explanation: Seaside granted access to what it believed to be Orange County,
California, but ended up sharing California data with Orange County New York’s county seat: Goshen.</p>
<p>In case you’re curious, these are the states that most searched California records:</p>
<div class="chart-placeholder" data-chart="ca-queried-states"></div>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>One by <a href="https://footnote4a.org/blog/ca-queries/edelson.pdf">Edelson, in Contra Costa County</a> and another by <a href="https://www.classlawgroup.com/flock-safety-license-plate-reader-cameras-lawsuit">GibbsMura in San
Francisco county</a>. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>SB34 has a logging requirement. Whether Flock’s audit logs satisfy it is a separate
question. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>audit-log-analysis</category>
        </item>
        <item>
            <title><![CDATA[Flock vs. FOIA: The Suppression Manual]]></title>
            <link>https://footnote4a.org/news/flock-vs-foia</link>
            <guid isPermaLink="false">https://footnote4a.org/news/flock-vs-foia</guid>
            <pubDate>Thu, 05 Mar 2026 15:00:00 GMT</pubDate>
            <description><![CDATA[Flock coaches police on denying records requests, inserts itself into the legal process, and sells a 'transparency portal' its own staff calls useless.]]></description>
            <content:encoded><![CDATA[<p>Since well before its short-lived <a href="burden-of-compliance"><em>Policy Pulse</em> blog series</a>, where Flock
assured its users it would help them with the “burden of compliance”, Flock has been waging war on
transparency. It does so not only by <a href="fbi-investigation">removing information it does not want
disclosed</a>, but also by inserting itself into legal public records (“FOIA”)
processes, and offering “guidance” on public records processes.</p>
<p>State and local governments aggressively resist open records requests related to Flock. They will
apply any exemption, no matter how non-sensical. Part of that is simply the government’s mindset—
the less accountability to the public the better. Part of that is Flock.</p>
<h2>The Guide</h2>
<p>Flock issues informal guidance to its customers on how to handle open records requests. A document,
“Guide to Flock Safety Data for Open Records Law” (last updated September 2025) opens by telling the
reader that they do not have to create records.</p>
<p>@<a href="https://footnote4a.org/blog/flock-vs-foia/external.pdf" class="collapsible">Guide to Flock Safety Data for Open Records Laws</a></p>
<p>The guide offers wildly incorrect legal advice.</p>
<blockquote>
<p>Generally limited disclosure [for ALPR data] across most states. Some states exempt all data
captured by or derived from any automatic license plate reader system from disclosure either by
express statute or per case law</p>
</blockquote>
<p>Rather than there being “generally limited disclosure”, few states have express protections for ALPR
data. This is self-evident from Flock’s wholly unregulated status as a provider of “photos taken on
public roadways where there is no expectation of privacy.” Those same photos are not “generally”
exempt from open records requests.</p>
<blockquote>
<p>Agencies should consider whether to redact license plates, search reasons, and case numbers from
these logs, as well as other potential fields that may be deemed sensitive</p>
</blockquote>
<p>Similarly, the open records laws that I am aware of do not permit redaction of “fields that may be
deemed sensitive.” Rather than relying on a clerk or a cop to subjectively deem something to meet an
unspecified standard of sensitivity, open records law tends to only permit redaction of items that
meet specific objective criteria defined by statute.</p>
<p>Flock’s document goes through every category of public record related to its system to identify
possible exemptions, suggesting ones for police investigations, security exceptions, and privacy
reasons. Throw exemptions at the requester and see what sticks.</p>
<p>When all else fails, Flock suggests in its suppression manual dressed up as customer support, its
government customers should not disclose the record, like the law requires, but “consider
negotiating a narrowed timeframe” and charging fees.</p>
<p>We’ve since seen other guidance, where <a href="fbi-investigation">customers are instructed to keep searches “as vague as
permissible”</a> come from FBI agents in Flock’s hometown of Atlanta.</p>
<p>In recent months, there has been a marked uptick in audit logs submitted to <a href="http://haveibeenflocked.com">haveibeenflocked.com</a> in
garbled PDFs—including from states that require public records to be produced in their original
electronic format.</p>
<p>One agency in Arizona did <a href="foia-mode">the FOIA-thing</a> and printed out the CSVs to scan them right
back in. Another delivered them to the requester on paper. Perhaps Flock updated its guidance.</p>
<h2>Contractual Obstruction</h2>
<p>Flock does not restrict itself to advising customers on their open records process, it inserts
itself. Some, but not all, contracts create a duty for customers to notify Flock and delay open
records responses.</p>
<blockquote>
<p>If a request is made pursuant to the Iowa Open Records Act, Iowa Code chapter 22, to examine
Confidential Information identified herein, the Customer will notify Flock. Flock will be given
not less than ten (10) calendar days within which to file an action in the Iowa District Court…
seeking the entry of a declaratory order or injunction to protect and keep confidential the
information identified as confidential herein. — <a href="https://footnote4a.org/blog/flock-vs-foia/johnston.pdf">Johnston, IA Service
Agreement</a></p>
</blockquote>
<p>This is clearly problematic from a transparency perspective, and, raises serious legal questions in
Iowa. The Iowa Open Records Act does not set fixed timelines for responses—it requires governments
to respond &quot;promptly.&quot;A mandatory minimum ten-day response delay is not “promptly.”</p>
<p>In <a href="https://footnote4a.org/blog/flock-vs-foia/grafton.pdf">Grafton, WI</a> the language is a bit softer; there, Flock
requires “reasonable prior notice.”</p>
<p>That’s not the only problem with this clause though. It is the vendor assuming a decision-making
role in the non-delegable public records process. While a government may delegate some of its
functions to third parties, the duty to respond to open records requests “promptly” lies exclusively
with the custodian, and delegating such decision-making authority to a private party is likely
unconstitutional.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>It’s the same reason we can’t hire mercenaries to police our cities—government employees must be
accountable to the people. At least on paper.</p>
<h2>Nothing the Public Can Gain</h2>
<p>Then there are the “transparency” portals. Flock has <a href="fbi-investigation">stripped functionality</a> to
hide essential information, but cities often still refer people who request access to log files to
the portals. In public, <a href="https://archive.is/XdJNs">Flock sells it as a transparency tool</a> “to promote trust,
accountability, and citizen privacy in policing.” In private, Flock tells its customers the truth:
it’s useless transparency theater.</p>
<blockquote>
<p>Take a look at this sample Transparency Portal and let me know if you’d like anything changed. All
fields can be edited, deleted or added to. Any of the fields in grey indicate information that
will be pulled directly from your Flock account. The only other thing worth noting is the Search
Audit…I have attached an example. <strong>There is nothing the public can gain from this report</strong>, as
it only provides the search date, camera and search reason. — Email from Libby Landers, Flock,
Senior Customer Success Manager, to Ridgecrest, CA Police Chief Ysit (June 25, 2024)</p>
</blockquote>
<p>@<a href="https://footnote4a.org/blog/flock-vs-foia/gain.pdf" class="collapsible">“Nothing the public can gain” - Ridgecrest, CA (2024)</a></p>
<p>If you are inclined toward charitable interpretation, you could see this as  an unfortunately-worded
email hastily typed by a customer service rep with an inflationary “Senior” title. Fair.</p>
<p>Except the same email Libby Landers sent to a California police department in 2024 shows up nine
months later, word for word, in Prosser, WA, with someone else’s signature (Danica Pierce, Flock’s
Local Customer Success Manager I).</p>
<p>@<a href="https://footnote4a.org/blog/flock-vs-foia/gain2.pdf" class="collapsible">“Nothing the public can gain” - Prosser, WA (2025)</a></p>
<p>Someone at Flock approved the message for use as a form email.</p>
<p>The next sentence in the form email is also worth highlighting:</p>
<blockquote>
<p>However, if you find your department’s users are not consistently searching off of incident/case
numbers, that may be a reason to hide the Search Audit. It is entirely up to you but just like to
point this out.</p>
</blockquote>
<p>It relates to another email, where Flock cites the <a href="federal-insecurity">CJIS Security Policy</a>:</p>
<blockquote>
<p>Per legal: A case number and/or call for service number listed for the search reason is a Flock
Requirement + Best Practice and <strong>required under Criminal Information Services (CJIS) Security
Policy as promulgated by the FBI</strong>.</p>
<p>4.2.5.1 Justification In addition to the use of purpose codes and togging information, all users
shall provide a reason for all all inquiries whenever requested by NCIC System Managers, CAs,
local agency administrators, or their representative</p>
<p>— Email from Kyle Turner, Senior Customer Success Manager, Flock to Ridgecrest, CA Police Chief
Groves (Feb 2025) (emphasis in original)</p>
</blockquote>
<p>@<a href="https://footnote4a.org/blog/flock-vs-foia/caseno.pdf" class="collapsible">Email Flock to Ridgecrest, CA Police Chief Groves (Feb 2025)</a></p>
<p>In a form email, Flock tells its customers to hide the evidence if its customers plan to violate
their contracts with the US Department of Justice and federal rules and regulations (and, in many
cases, parallel state law).</p>
<p>Ridgecrest, CA PD has disabled case numbers in the Transparency Portal.</p>
<h2>The Lawyers Know</h2>
<p>The government, or, at least, its lawyers, know that their legal justifications for denying requests
are thin. In an email exchange between Prosser, WA, city officials and (presumably) their attorney,
sparked by a records request from <a href="https://www.muckrock.com/accounts/profile/rose.terse/">MuckRock user Rose Terse</a>, the attorney expresses some
frustration with Flock’s relationship to public records.</p>
<p>Emily Guildner of Thompson, Guildner &amp; Associates, writes to her partner, Nikki Thompson:</p>
<blockquote>
<p>i think it is a better argument that its not a record yet but i really just want all of our
clients to stop using flock cameras.</p>
</blockquote>
<p>She attempts to come up with a justification but comes up short:</p>
<blockquote>
<p>I guess the question is whether it is “a writing” already out there but in an illegible format or
not. Cities do have to pull data from a data base if requested, I just don’t know what form this
is in, or if its in no form until there is an inquiry run?</p>
</blockquote>
<p>She settles on the poorly-fleshed out theory regardless:</p>
<blockquote>
<p>well our position on these is that they are a little different in that the pictures etc are
records that are out there, the audit logs are not a record yet. so its not about access
its about the fact that we would have to create a record to respond to the records
request. but i think we’re on thin ice…</p>
</blockquote>
<p>Thompson finally sends a proposed response to city staff, denying the request for it being “creating
a record” and asking staff:</p>
<blockquote>
<p>Thoughts? Are you sure you don’t want to turn [the Flock cameras] off? Remember that attorney fees
are mandatory, if a City loses in public records litigation.</p>
</blockquote>
<p>Two months later, in January 2026, Prosser <a href="https://www.yakimaherald.com/news/local/government/prosser-deactivates-flock-safety-cameras-following-review/article_f3c8916f-3523-4137-b2cd-3ec8b1b071e2.html">turned them off</a>.</p>
<p>@<a href="https://footnote4a.org/blog/flock-vs-foia/prosser.pdf" class="collapsible">Prosser, WA attorney email chain</a></p>
<p>Flock industrialized existing government hostility to public records with guides, form emails,
contract clauses, and a “transparency portal” engineered to disclose nothing of value.</p>
<p>Prosser’s attorney asked the right question. More cities should answer.</p>
<hr>
<p class="text-xs text-muted mt-4 mx-4 text-center">Cross-posted from <a href="https://footnote4a.substack.com/p/flock-vs-foia-the-suppression-manual">Footnote 4A</a>, where I cover Flock, privacy, and public-private
surveillance infrastructure more broadly. Flock-specific posts live on
<a href="http://haveibeenflocked.com">haveibeenflocked.com</a>.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p><em>Horsfield Materials, Inc. v. City of Dyersville</em>, 834 N.W.2d 444 (Iowa 2013)
places the duty to respond promptly on the custodian; while Iowa’s non-delegation doctrine in
Art. III, § 1 is sparsely litigated, in <em>Carter v. Carter Coal Co.</em>, 298 U.S. 238 (1936), the
U.S. Supreme Court wrote about “legislative delegation in its most obnoxious form; for it is not
even delegation to an official or an official body, presumptively disinterested, but to private
persons whose interests may be and often are adverse to the interests of others in the same
business.” <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>foia-transparency</category>
        </item>
        <item>
            <title><![CDATA[Iowa's ALPR Bill Would Make Des Moines the License Plate Data Capital of America]]></title>
            <link>https://footnote4a.org/news/hf2161-march</link>
            <guid isPermaLink="false">https://footnote4a.org/news/hf2161-march</guid>
            <pubDate>Tue, 03 Mar 2026 22:15:00 GMT</pubDate>
            <description><![CDATA[An amendment strips warrant requirements and hands insurance companies access to a national surveillance database — with Iowa as the legal gateway.]]></description>
            <content:encoded><![CDATA[<p><a href="https://www.legis.iowa.gov/docs/publications/LGI/91/HF2161.pdf">Iowa House File 2161</a> started life as a bill purporting to regulate Automatic License Plate
Readers (ALPRs). It began as a well-intentioned, if likely toothless, attempt to put guardrails
around police use of surveillance technology. <a href="https://www.legis.iowa.gov/docs/publications/AMDI/91/H8006.pdf">An amendment</a> has turned it into something
else: statutory authorization for commercial entities to access a privately-operated surveillance
network built on public property, public permits, and public contracts — all under the guise of
fraud prevention<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> and claims adjudication.</p>
<p>Civil rights organizations appear not to have caught on. At the time of writing, they are still
voicing support for a bill that threatens to severely undermine the privacy rights of everyone in
the country.</p>
<h2>A Private Network on Public Infrastructure</h2>
<p>The legal theory under which camera-operators and police operate is that they are photographing
vehicles on public roadways, and that the images therefore don’t implicate privacy interests.</p>
<p>Flock’s cameras sit on public utility poles, installed under public permits, paid for under public
contracts — infrastructure a purely private company could never obtain on its own. The data flows
into a corporate-owned database that participating agencies can query nationwide. Flock is not a
government agency; it’s a vendor that has successfully made itself look like public infrastructure.</p>
<p>The data is public enough to collect from every street corner without a warrant; when requested
under open records laws, those same images and records tend to magically transform into sensitive
intelligence not fit for public consumption.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> When a Washington state court found that
version of Schrödinger’s photographs — public enough to gather on every corner, too sensitive to
disclose to the public whose streets paid for them — to be legally incoherent, police across the
state cancelled their ALPR contracts, ostensibly to protect Washingtonian privacy.</p>
<p>Vendors and police have so far resisted both horns of this dilemma. There is no warrant requirement
for collection, no meaningful FOIA access, and agencies can look up anyone’s long-term, nationwide
location history without judicial oversight. The data is pooled nationally. A camera in Des Moines
contributes plate reads to the same database as a camera in Houston.</p>
<p>This is not an Iowa database. It is a national one.</p>
<h2>How Iowa Becomes a National Gateway</h2>
<p>Readers outside the Hawkeye State may not be aware that Des Moines is a — perhaps <em>the</em> — major
<a href="https://data.iowa.gov/Regulation/Iowa-Domiciled-Insurance-Companies/wd57-wrqf/explore/query/SELECT%0A%20%20%60company_name%60%2C%0A%20%20%60company_type%60%2C%0A%20%20%60naic_number%60%2C%0A%20%20%60iowa_license_number%60%2C%0A%20%20%60iowa_domiciled%60%2C%0A%20%20%60address1%60%2C%0A%20%20%60address2%60%2C%0A%20%20%60company_city%60%2C%0A%20%20%60company_state%60%2C%0A%20%20%60company_zip%60%2C%0A%20%20%60telephone%60%2C%0A%20%20%60alternate_address1%60%2C%0A%20%20%60alternate_city%60%2C%0A%20%20%60alternate_state%60%2C%0A%20%20%60alternate_zip%60%2C%0A%20%20%60alternate_telephone%60%2C%0A%20%20%60business_license_type%60%2C%0A%20%20%60ownership_type%60%2C%0A%20%20%60location%60%2C%0A%20%20%60alternate_location%60/page/filter">insurance hub</a> in the United States, home to Principal Life, Transamerica, Wellmark,
EMC, United Fire, and dozens of others. Iowa-domiciled insurers account for roughly 2–4% of total US
premiums, heavily concentrated in life, annuity, and commercial lines.</p>
<p>The amendment doesn’t restrict ALPR data access to Iowa insurers, Iowa plates, or Iowa accidents. It
opens the tap to any “insurance carrier, or an insurance support organization” — nationally, without
geographic limitation.</p>
<p>Flock and similar vendors maintain a pooled database of plate reads contributed by agencies across
the country. An Iowa city enters into an agreement with Flock. Under the amended bill, that city may
now lawfully share the data — location history, timestamps, images — with insurers for “adjudicating
insurance claims,” even if the data was originally collected nowhere near Iowa. Iowa’s authorization
is the fig leaf that legitimizes access to a database populated by agencies in California, Texas,
and New York.</p>
<p>That’s data laundering: a permissive jurisdiction provides the legal cover that turns a
publicly-subsidized national surveillance network into a commercial data product. Iowa’s
overrepresentation in the insurance industry means the companies most likely to exploit this are
disproportionately headquartered in the same state that just handed them the keys.</p>
<p>The phrase “insurance support organization” makes this worse. In insurance law, that covers data
aggregators, claims analytics firms, and infrastructure providers like <a href="https://www.verisk.com/solutions/underwriting-rating/general-liability/">Verisk/ISO</a> —
entities whose business is pooling and reselling data across the industry. Data that enters that
pipeline does not stay in the lane it entered through.</p>
<p>The amendment doesn’t just give insurers access to ALPR data; it gives the entire insurance data
ecosystem access to ALPR data.</p>
<p>Next time you’re involved in a car accident, the insurer may pour through your location history to
find reasons not to pay. Stopped at a bar the night before, even for a diet soda? That may become an
argument. If your employer’s insurer is watching while you recover from an injury, think twice
before leaving the house to pick up your prescription.</p>
<h2>What the Amendment Actually Removed</h2>
<p>The original bill named a legal threshold: no one could access ALPR data more than 24 hours after
capture without a magistrate-issued search warrant or a county attorney’s subpoena for a specific
plate. In practice, the subpoena option gutted the warrant requirement before the ink dried — a
county attorney can issue one without judicial oversight, meaning the same prosecutorial office that
wants the data could authorize its own access. But even that weak threshold is gone.</p>
<p>In its place: a requirement to log a “call for service number or case number” before searching.
That’s an administrative record-keeping requirement, not a legal threshold. No independent review,
no probable cause, no judicial oversight.</p>
<p>The original bill also flatly prohibited sharing data with any nongovernmental third party. The
amendment replaced that prohibition with an explicit whitelist that includes insurers, or anyone who
promises to use the data “for the sole purpose of protecting public safety, conducting criminal
investigations, or ensuring compliance with federal, state, or local law.” What was a ban became an
authorization.</p>
<p>The penalty regime was similarly softened. Violations now require proof of “willful and intentional”
conduct, and the aggravated misdemeanor threshold requires the violation also be committed “for
personal gain or while violating any other provision of law.” Routine unauthorized sharing — the
kind driven by bureaucratic carelessness or vendor pressure — is unlikely to be prosecuted at all.</p>
<h2>The Lobbying Picture</h2>
<p>The <a href="https://www.legis.iowa.gov/lobbyist/reports/declarations?ga=91&amp;ba=HF2161">lobbying declarations</a> for this bill tell a more complicated story than the civil
liberties coalition supporting it would suggest.</p>
<p>The Iowa Association for Justice, Institute for Justice, the American Civil Liberties Union of Iowa
(ACLU-IA), and Americans For Prosperity are all registered For the bill. AFP’s registration predates
the amendment by two weeks; ACLU-IA’s and IJ’s were filed the same day the amendment dropped in
committee. Whether their support reflects the amended text or the original is a question worth
asking them directly.</p>
<p>Flock itself is registered as Undecided. So is RELX Inc. — the parent company of LexisNexis Risk
Solutions, one of the largest data brokers in the country. LexisNexis Risk Solutions sells
comprehensive consumer risk profiles to insurers, compiled from court records, motor vehicle
databases, property records, and commercial data sources. It has no reason to be watching this
legislation unless the amendment’s “insurance support organization” carve-out is relevant to its
business — which it plainly is. That it hasn’t registered in support suggests either that the bill
doesn’t go far enough, or that it’s waiting to see which way it moves. The National Insurance Crime
Bureau — explicitly named in the amendment’s carve-out — is also Undecided.</p>
<p>The Iowa State Sheriffs’ &amp; Deputies’ Association, the Iowa State Police Association, and the Iowa
Peace Officers Association are all registered Against. So are Axon Enterprise and the Security
Industry Association — Flock’s commercial competitors, whose objections are about market share, not
civil liberties.</p>
<p>No group is opposing the bill on civil liberties grounds.</p>
<h2>What This Bill Actually Does</h2>
<p>It authorizes local Iowa governments to deploy a privately-operated surveillance network on public
infrastructure — then share the resulting data with the commercial insurance industry, nationally,
with no warrant requirement, no meaningful penalty for abuse, and no restriction on which insurers,
in which states, beyond the three enumerated purposes.</p>
<p>Iowa is not regulating mass surveillance. Iowa is commercializing it.</p>
<hr>
<p class="text-xs text-muted mt-4 mx-4 text-center">Cross-posted from <a href="https://footnote4a.substack.com/p/how-the-iowa-alpr-bill-enables-mass">Footnote 4A</a>, where I cover Flock, privacy, and public-private
surveillance infrastructure more broadly. Flock-specific posts live on
<a href="http://haveibeenflocked.com">haveibeenflocked.com</a>.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Iowa DOT’s long-running <a href="https://footnote4a.substack.com/p/dot-frt">facial recognition program</a> also began life as a tool to combat
fraud. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Despite the database being owned and operated by a private corporation — one whose cameras were
installed using public permits, public contracts, and in many cases public funds. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock promises to implement logging feature it claimed existed]]></title>
            <link>https://footnote4a.org/news/california-cjis</link>
            <guid isPermaLink="false">https://footnote4a.org/news/california-cjis</guid>
            <pubDate>Mon, 02 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Flock Safety's blog post about 'enhanced guardrails' is a confession dressed as a product announcement. The company admits it wasn't logging sharing configuration changes — a CJIS Security Policy violation — while its guardrails still leave tribal nations and private universities outside SB 34's reach.]]></description>
            <content:encoded><![CDATA[<p>In November last year, I published “<a href="federal-insecurity">Federal Insecurity: How Flock Lies to the Feds</a>.”
Now, Flock got caught in that lie. But it promises to do better. Sort of.</p>
<p>Several California agencies have reported discovering that data was shared in violation of SB
34—although I have not yet been able to verify the exact number, I’ve heard as many as 63 California
agencies have been confirmed affected. This certainly seems plausible with separate reports coming
out of <a href="https://www.ktvu.com/news/flock-cameras-saratoga-mountain-view-immigration">Mountain View</a>, <a href="https://santacruzlocal.org/2026/01/13/santa-cruz-leaders-vote-to-terminate-contract-with-flock/">Santa Cruz</a>, <a href="https://abc7news.com/post/santa-clara-county-stop-using-flock-safety-cameras-several-cities-privacy-concerns/18646060/">Santa Clara County</a>, and <a href="https://www.cbsnews.com/losangeles/news/flock-license-plate-readers-shared-data-with-out-of-state-federal-agencies/">Ventura County</a>.</p>
<p>In <a href="https://losgatan.com/santa-cruz-terminates-its-contract-with-flock-safety/">earlier reporting by Los Gatan</a>, Santa Cruz said that Flock had notified them of an issue.
In response to a CPRA request, Santa Cruz denies the existence of that email.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> However, Santa
Cruz Chief of Police Bernie Escalante <em>did</em> deliver the following statement at a November 18, 2025,
Santa Cruz city council meeting:</p>
<blockquote>
<p>We were recently made aware that Flock Safety identified violations of SB 34 and SB 54 within
their system architecture that inadvertently affected agencies across California, including the
City of Santa Cruz.</p>
<p>The issue arose when a national search tool within the Flock Safety system was activated which
inadvertently permitted law enforcement agencies outside the state of California to search all
agencies across the country including agencies within the state of California.</p>
<p>These violations were not known to Santa Cruz Police Department and were not the result of any
deliberate attempt by city staff to circumvent the California law.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> We have been notified by
Flock that these violations ceased on February 11, 2025.</p>
<p>Additionally, since this date, Flock has added multiple layers and filters of security to ensure
this does not occur again in the future. Since February 11, 2025, Flock has made several changes
to their system to ensure this does not occur again and to ensure that the Santa Cruz police
department is not in violation of state law—both SB 34 and SB 54.</p>
<p>So far, Flock has deactivated the national search tool for agencies within the state of
California, revoked all permissions for any California agency to create a 1:1 relationship with
any agency outside the State of California and added filter protections against any searches that
include anything related to ICE, broder patrol, immigration, or any other word or phrase like this
type of search.</p>
<p>Flock continues to look for additional ways to improve or modify their system to ensure the
security of their data is within the laws of the state of California.</p>
<p>— <a href="https://www.youtube.com/watch?v=ia-Qm-huAJM">SCPD Statement</a>, Santa Cruz City Council Meeting, November 18, 2025</p>
</blockquote>
<p>A lot of this statement is demonstrably false.</p>
<p>As we know, <a href="el-cajon-ca-feb2026">1:1 sharing is alive and well in California</a>.</p>
<p>Yet this is the statement SCPD made in November last year, about an action Flock had taken some time
before February 2025—a little over a year before today’s blog post, where it announces, for the most
part, the same problem and the same changes.</p>
<p>Either Flock kept all of this under wraps for over a year,<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup> or it happened again, because Flock is
once again engaging <a href="https://archive.is/aD5ly">damage control mode on its blog</a>, announcing many of the same “new”
features the SCPD announced were introduced in February 2025.</p>
<p>Of course, it’s Flock, so “damage control” means “hand me a shovel so I can keep digging.”</p>
<h2>Flock Knows, You Don’t.</h2>
<blockquote>
<p>some CA law enforcement agencies, including Ventura County, in 2025 had their camera networks
inadvertently accessible<sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup> to out-of-state law enforcement agencies for a period of time.</p>
</blockquote>
<p>Flock immediately downplays and obfuscates what happened. Agencies “had their cameras accessible.”
That doesn’t mean anything. “For a period of time.” Equally meaningless. How much data was shared in
violation of state law? For how long?</p>
<p>Flock knows what happened, and, according to SCPD, even notified agencies back in 2025, but it has
decided you don’t get to know.</p>
<blockquote>
<p>[Flock] made every effort possible to determine the cause of each reported instance of inadvertent
sharing. Unfortunately, due to earlier limitations in technical logging, in some cases it is
impossible to determine a specific cause.</p>
</blockquote>
<p>Let’s assume for a second that this is true. Let’s say Flock is careless and does not log who makes
changes to a critical toggle.</p>
<p>If a cause can’t be determined, it can only mean one thing: there are multiple options.</p>
<p>It means Flock customers are <strong>not</strong> the only ones in control. It means that the pitch that “you own
100% of your data, and you are in control”, as well as “it’s a local decision” is completely,
utterly, false. There is no other explanation.</p>
<p>Flock, in this same blog post, nonetheless continues to assert that “cities and counties retain
100% control over their LPR data and determine who it is shared with.”</p>
<p>Clearly not.</p>
<h2>The Logging Requirement</h2>
<p>Flock not having logging would in itself be yet another admission that it does not follow the CJIS
security policy, like it implies when it flaunts its “CJIS ACE Certificate” from its commercial
partner in Florida.</p>
<p>The <a href="https://le.fbi.gov/file-repository/cjis_security_policy_v6-0_20241227.pdf">CJIS Security Policy v6.0</a> has several relevant requirements:</p>
<ul>
<li>AU-2 (Event Logging) and CM-3 (Configuration Management) require exactly the type of logging Flock
claims not to have.</li>
<li>4.2.5.1 (Justification) and AU-3 (Content of Audit Records) require the purpose of a query. Flock’s
<a href="https://footnote4a.org/dropdown-reasons">NIBRS-based</a> justification requirement is not an enhancement — it is the minimum
that should have been in place from the outset.</li>
<li>CA-3(d) (Secondary Dissemination) — secondary dissemination must be logged; those logs must
include the requester’s authorization.</li>
</ul>
<p>In Flock’s half-baked defense, it does fall on the agencies to verify that Flock abides by the terms
of the contract it signed, and to make sure their vendor isn’t simply having its rank-and-file
employees sign <a href="flock-access">a form that exposes them, not the company</a> to liability when
violations inevitably happen.</p>
<h2>Flock Promises More Violations</h2>
<p>For those who have been following along for a while, the gradual narrowing is interesting to watch.
In a span of weeks, Flock’s messaging shifted from “Flock does not sell data,” to “Flock does not
sell data to the federal government” to “Flock does not sell data to DHS agencies.”</p>
<p>When even the <a href="https://footnote4a.org/pd/8258-federal-us-postal-inspection-service/audit?q=immigration&amp;sort=date_desc">postal service does civil immigration enforcement</a> it becomes hard to track.</p>
<blockquote>
<p>“Flock has always provided agencies with tools to comply with state law and relied on each agency
and its legal counsel to determine how those tools should be configured,” said Dan Haley, Chief
Legal Officer at Flock Safety.</p>
</blockquote>
<p>Dan clearly did not read the 345 words in the blog post preceding that statement, announcing that
Flock, in fact, did not always provide those tools but is now adding them.</p>
<blockquote>
<p>Flock Safety and California law enforcement agencies remain committed to ensuring that
investigative technologies are used responsibly, lawfully, and with appropriate oversight. The
system in place today includes standardized compliance protections designed to prevent
unauthorized federal access through lookup networks and to provide clear audit trails for every
search conducted.</p>
</blockquote>
<p>This statement deserves highlighting. Flock once again promises to prevent only unauthorized
<em>federal</em> access, and only if that unauthorized access happens <em>through lookup networks</em>.</p>
<p>This is a highly relevant distinction; at the time of writing, even a cursory inspection of
Transparency Portals shows Flock still permits sharing data with non-California agencies. And, no,
I’m not talking about <a href="el-cajon-ca-feb2026">El Cajon</a>’s open defiance of the AG, I’m talking about
Lake County, Piedmont, San Francisco, and so on.</p>
<p>California Attorney General Bonta clarified in his <a href="https://oag.ca.gov/system/files/media/2023-dle-06.pdf">October 2023 bulletin</a> that SB34 prohibits
sharing with any entity that is not a public agency. He included the definition:</p>
<blockquote>
<p>“Public agency” is defined as “the state, any city, county, or city and county, or any agency or
political subdivision of the state or a city, county, or city and county, including, but not
limited to, a law enforcement agency.”</p>
</blockquote>
<p>Because this definition excludes non-California agencies, it forms the basis for SB 34 being
understood to prohibit sharing outside of California.</p>
<p>What this definition also does not include are tribal nations and private university police —
neither are subdivisions of the State of California. Yet both appear on Flock’s California agency
lists: Blue Lake Rancheria Tribal PD, the Iipay Nation of Santa Ysabel, Stanford University PD, and
the University of the Pacific. All are permitted to access California ALPR data under Flock’s
“guardrails.”</p>
<p>These agencies also fit neatly into Flock’s promise, because arguably, although they have access to
the lookup network, they could be said not to be “federal agencies.” Of course, they also aren’t
“public agencies,” and all of this still violates the law.</p>
<p>Flock’s guardrails are carefully designed — not to prevent unlawful sharing, but to redefine what
counts as sharing. Each iteration narrows the promise while leaving the violation intact: not “we
don’t share data,” but “we don’t share data with DHS agencies through lookup networks in ways we
can’t characterize as something else.”</p>
<p>The question for California agencies isn’t whether Flock “remains committed” to lawful use. It’s how
many times they’re willing to take that commitment at face value before they check the audit logs —
assuming, of course, that Flock has started writing them.</p>
<p>(Perhaps this is why Flock is now <a href="https://www.classlawgroup.com/flock-safety-license-plate-reader-cameras-lawsuit">facing a class action in California</a>.)</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Of course, in keeping with the government’s long-standing tradition of disdain for
transparency, Santa Cruz sent its CPRA response at 5:02 <span style="font-variant:
all-small-caps">PM</span>. I will update this article with an explanation of the contradiction,
should the city provide one. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Remember kids, it’s okay to break the law, as long you don’t do it on purpose. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>Which says nothing good about the California agencies that didn’t notice this in their
logs for a year—as I pointed out last <a href="august-2025-drop">November</a>. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>It could be a coincidence both Flock and SCPD both use the phrase “inadvertently
accessible.” It could also not be. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock's Best Argument: Cops Can't Stop Being Racist Without Us]]></title>
            <link>https://footnote4a.org/news/racist-cops</link>
            <guid isPermaLink="false">https://footnote4a.org/news/racist-cops</guid>
            <pubDate>Fri, 27 Feb 2026 21:00:00 GMT</pubDate>
            <description><![CDATA[A surveillance company and a surveillance-industry lobbyist walk onto a livestream.]]></description>
            <content:encoded><![CDATA[<p>This is a verbatim quote from <a href="https://archive.is/eeP96">Flock’s latest blog post</a>:</p>
<blockquote>
<p>For decades, policing often relied heavily on eyewitness descriptions.</p>
<p>An officer might hear:</p>
<p>“We’re looking for a white Ford.”</p>
<p>“The suspect was driving a blue Jeep.”</p>
<p>What happened next?</p>
<p>Officers would stop every vehicle matching that general description in the area. That meant
multiple drivers, often entirely innocent, were pulled over and had unwelcome interactions with
law enforcement simply because their car looked similar. Those stops could lead to frustration,
fear, and unnecessary escalation. And historically, those broad stop practices have
disproportionately affected communities of color.</p>
<p>This is exactly the kind of dynamic that creates distrust.</p>
<p>Flock changes that.</p>
<p>Instead of stopping every white Ford or blue Jeep in a radius, officers receive alerts only when a
specific license plate associated with a reported crime is detected. Not every vehicle of a
certain color. Not every driver in a neighborhood. Just the one vehicle that matches the reported
plate. That’s precision policing. It reduces unnecessary stops. It reduces guesswork. It reduces
broad, discretionary sweeps. And that reduction in discretion helps reduce bias.</p>
</blockquote>
<p>The passage directly echoes a comment made last week by Skylor Hearn on a privacy-focused
livestream hosted by VPN company <a href="http://vp.net">vp.net</a>. Hearn appeared alongside Dan Haley, Flock’s Chief Legal
Officer. Hearn told the audience:</p>
<blockquote>
<p>In the old days… it was the citizen, one of you, reporting what you saw in a flash, in a
horrific moment in your life, and you described generally a light-colored car. And so we’re
stopping every light-colored car that’s going down the road in that area. And 99% of those people
in those cars had nothing to do with that crime, but we’re pulling you over sometimes at gunpoint,
taking you out… The technology gives us the ability to be more select and discretionary in those
same kind of encounters. So we’re not indiscriminately just stopping everyone that resembled the
citizen’s call. This gives us another tool to help us be more sniper than shotgun.</p>
</blockquote>
<p>Same argument, same structure, same anecdote. Cops used to pull over every white car at gunpoint;
now Flock saves them from themselves.</p>
<p>Hearn was introduced on the stream as “Chief Deputy, Chambers County Sheriff’s Office.” That’s true
— he holds that title.</p>
<p>What the hosts neglected to mention is that Hearn is also the Executive Director of the <a href="https://www.sheriffstx.com/">Sheriffs’
Association of Texas</a>, a <a href="https://pulitzercenter.org/stories/texas-ai-powered-surveillance-arsenal-has-ballooned-proposed-laws-provide-few-guardrails">registered lobbyist for Clearview AI</a> in 2020–2021, and a
former <a href="https://www.klgates.com/kl-gates-adds-longtime-public-safety-professional-as-austin-government-affairs-advisor-6-15-2020">government affairs adviser at K&amp;L Gates</a>, where Clearview AI was his client.</p>
<p>He joined Clearview in-house in 2022 as its Director of Government Affairs, spending his time
testifying in state legislatures against banning or restricting police use of facial recognition
technology.</p>
<p><img src="https://footnote4a.org/blog/racist-cops/hearn.png" alt="Hearn on the vp.net livestream, February 21, 2026"></p>
<div class="text-sm text-center mb-2 italic">
Lobbyist Hearn on the vp.net livestream, February 21, 2026. Or Texas cop "I Spy".
</div>
<p>When a viewer asked Hearn directly about his Clearview AI and K&amp;L Gates history, he disclosed it —
framing it all as “public policy work” and talking about “misconceptions about technology.” He did
not use the word “lobbyist.”</p>
<p>So a man who is simultaneously a Flock subscriber and the Sheriffs’ Association’s legislative
director sat down with Flock’s Chief Legal Officer on a livestream, and a week later their shared
talking point appeared on Flock’s corporate blog.</p>
<p>The best argument this team could muster asks us to accept the premise they’re selling: that police
officers are simply incapable of conducting constitutional traffic stops without an AI to chaperone
them.</p>
<p>Their proposed solution to police violating one group’s rights? Let Flock violate everyone’s.</p>
<p>The Fourth Amendment does not have a carve-out for good intentions, and mass surveillance is not a
civil rights program.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[The Northern California Fusion Center: A High School Case Study]]></title>
            <link>https://footnote4a.org/news/ncric</link>
            <guid isPermaLink="false">https://footnote4a.org/news/ncric</guid>
            <pubDate>Thu, 26 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[NCRIC's post-SB 34 policy changes stripped security requirements and audit oversight while its log data shows explosive, bot-like search activity from anonymous accounts—raising the question of whether California's largest fusion center is laundering out-of-state access to ALPR data.]]></description>
            <content:encoded><![CDATA[<p>About a week ago, I had the pleasure of speaking with a number of students from Sequoia Union High
School District in California who were working on an article about surveillance and Flock. They
asked great questions about their local fusion center, the Northern California Regional Intelligence
Center (NCRIC), as well as about California’s <a href="https://www.leginfo.ca.gov/pub/15-16/bill/sen/sb_0001-0050/sb_34_bill_20151006_chaptered.html">SB 34</a>—a 2015 law that, among other things,
prohibits public agencies from sharing ALPR data except with other public agencies, and requires
operators to maintain security procedures, access logs, and retention
limits.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>Questions I could not answer in detail, but that are important and deserve answers.</p>
<p>I’ve written about fusion centers before, in the post about the federal <a href="https://footnote4a.org/news/riss-shell-game">Regional Information
Sharing Systems®</a> (RISS) program—which are federally-funded,
quasi-privately-operated “fusion centers before it was cool”. That post was mainly in the abstract.
Let’s examine what’s happening at NCRIC.</p>
<h2>Fusion centers and data sharing</h2>
<p>NCRIC is a practical example of what can go wrong when we take promises about data retention and
security at face value, and what happens when we write poorly drafted bills—like <a href="https://www.legis.iowa.gov/legislation/BillBook?ga=91&amp;ba=hf2161">HF 2161</a>
chugging along here in Iowa, with the <a href="https://www.legis.iowa.gov/lobbyist/reports/declarations?ga=91&amp;ba=HF2161">ACLU of Iowa’s support</a>.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<p>Data dissemination centers like RISS “permit federated searching across many systems without
requiring the RISSNET user to have a separate user account for each partner system.” But that
website copy is about as far as we get—while federally funded,<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup> these centers are operated
as private corporations and are therefore not subject to the Freedom of Information
Act.<sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup><sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup></p>
<p>But we don’t have to speculate for too long. The state of Colorado lays it all out cleanly for its
Auto Theft Intelligence Coordination Center (ATICC):</p>
<blockquote>
<p>The goal of this project is to share license plate recognition data among all contributing
agencies that have established this  Memorandum  of  Understanding  with  the  Colorado  ELSAG
EOC, managed by the Colorado State Patrol (CSP) ATICC.</p>
<p>Participating agencies will share license plate reader (LPR) information for replication to the
data warehouse or as part of a central querying system hosted by the Colorado ELSAG EOC and will
have the capability to query all LPR based information from around the State of Colorado which is
stored within the warehouse</p>
</blockquote>
<p>Simple as that. Drop everything in CSP’s bucket, and take what you need. Cop-communism.</p>
<p>In case you’re wondering, ELSAG cameras are a Leonardo product.<sup class="footnote-ref"><a href="#footnote6">[6]</a><a class="footnote-anchor" id="footnote-ref6"></a></sup> They offer stationary
surveillance cameras (with cool-sounding names like “The Street Sentry™” and “The Fixed Plate
Hunter™”), as well as mobile cameras <a href="https://archive.is/jf89J">disguised as roof-mounted skiboxes or construction
barrels</a>.</p>
<p>In the MoU, the “Denver Police Department agrees to share ALPR data with other law enforcement
agencies utilizing the Colorado ELSAG EOC”, where it can be stored for up to three years.<sup class="footnote-ref"><a href="#footnote7">[7]</a><a class="footnote-anchor" id="footnote-ref7"></a></sup></p>
<p>Although Colorado State Patrol was short-sighted enough to name its own entity after a vendor
product,<sup class="footnote-ref"><a href="#footnote8">[8]</a><a class="footnote-anchor" id="footnote-ref8"></a></sup> ATICC explicitly commits to “obtaining the cooperation of any third-party contractor or
vendor” that provides license plate reader systems in Colorado. Presumably this includes Flock.</p>
<p>@<a href="https://footnote4a.org/blog/ncric/csp-sharing.pdf" class="collapsible">Colorado ELSAG EOC MoU</a></p>
<p>The “data warehouse” used by CSP, while only one component of a fusion center, is a much more
descriptive term for what’s really happening at the backdoor of these systems.</p>
<h2>The Northern California Regional Intelligence Center (NCRIC)</h2>
<p>Colorado is not just similar to NCRIC—it’s the template for what NCRIC is almost certainly doing but
refusing to document. NCRIC gives itself permission to store ALPR data for up to 12 months, and
broadly disseminate it.</p>
<blockquote>
<p>The [ALPR] information is also retained for a fixed retention period, though it is only
reaccessible by law enforcement given a legitimate law enforcement purpose.</p>
</blockquote>
<p>The FAQ specifies that only users with a need-to-know have access, but, from context, it’s clear that
NCRIC’s version of “need-to-know” is clearly not particularized and apparently extends to all ALPR
data, forever.</p>
<p>Although the <a href="https://footnote4a.org/blog/ncric-alpr-faq-2015.pdf">previous version of NCRIC’s FAQ</a> was more explicit that
“most ALPR data will be stored for 12 months,” the current FAQ is silent on retention. The FAQ
drones on for a bit, carefully evading its own questions, but at the end of it all, the agency
essentially gives itself carte blanche to do what Colorado spelled out more clearly.</p>
<p>@<a href="https://footnote4a.org/blog/ncric/ncric-alpr-faq-2021.pdf" class="collapsible">NCRIC ALPR FAQ</a></p>
<p>The policy reveals more. Especially in light of SB 34.</p>
<p>In October 2023, the California Office of the Attorney General <a href="https://oag.ca.gov/news/press-releases/attorney-general-bonta-advises-california-law-enforcement-legal-uses-and">issued bulletins gently reminding
police laws exist</a>, and that they are not supposed to be sending ALPR data from California
to out of state agencies.<sup class="footnote-ref"><a href="#footnote9">[9]</a><a class="footnote-anchor" id="footnote-ref9"></a></sup> Exactly six months later NCRIC disappears from non-California
log files.</p>
<p>NCRIC updated its ALPR policy accordingly, but in a way that created performative compliance and
resulted in less oversight.</p>
<ul>
<li>It removed the specific security requirements for data storage—SECRET-level clearances, 24/7
security personnel, multiple secured doors—replacing them with a passing reference to “secure
systems.”</li>
<li>It removed the requirements for multi-factor authentication and encryption.</li>
<li>It removed the requirement for audit logs to contain a “justification for access.”</li>
<li>It weakened retention limits from a hard cap (“shall not be retained longer than 12 months” with
explicit purge requirements) to an aspirational ceiling (“supports a maximum retention period of
365 days”), and outsourced the actual operative limit to whichever vendor NCRIC happens to be
using.</li>
<li>It authorized sourcing ALPR information from private sources, including “parking, tolling, private
security, or other sources”—where the 2021 policy explicitly prohibited sharing data with
commercial entities.</li>
<li>It introduced contradictory language on visual confirmation of plate reads: one section retains the
2021 standard (“to the fullest extent possible”), while another weakens it to “should visually
confirm.”</li>
<li>It dropped the annual training recertification requirement entirely.</li>
</ul>
<p>The FAQ changed in parallel. The 2015 FAQ described a multi-factor authentication process
requiring a randomly generated PIN sent to a government email account. The current FAQ reduces
this to “a unique username and login.” That downgrade is worth keeping in mind when we get to
the part about user “a.”</p>
<p>@<a href="https://footnote4a.org/blog/ncric/ncric-alpr-policy-2021.pdf" class="collapsible">NCRIC ALPR Policy 2021</a>
@<a href="https://footnote4a.org/blog/ncric/ncric-alpr-policy-2024.pdf" class="collapsible">NCRIC ALPR Policy 2024</a></p>
<p>Where the policy did not change much was its audit requirements. Those are still essentially
non-existent, requiring only a report based on a “sampling” (it does not say the sampling must
be random) be sent to the NCRIC director.</p>
<h2>The Logs: Counting Searches</h2>
<div class="chart-placeholder" data-chart="ncric-weekly"></div>
<div class="chart-placeholder" data-chart="ncric-users"></div>
<p>To get the cleanest possible data, these charts are based on only two sets of log files: Louisville,
KY from March 2022 through April 29, 2024, and Capitola, CA from that date onward.</p>
<p>The charts show a highly suspicious trend. Here it is, close up, based on only Capitola data:</p>
<div class="chart-placeholder" data-chart="ncric-daily"></div>
<p>Between January 1, 2024 and May 1, 2024, the enforcement date, the number of searches NCRIC does is
low, peaking at around 170. Activity stays around that level until the beginning of June, when both
the number of users, but especially the number of searches see explosive growth.</p>
<p>NCRIC more than doubles the number of active users, going from having 5–20 weekly active users to a
consistent ~40. What’s more, individual users go from doing ~5 searches/week to ~60 searches/week.</p>
<p><a href="https://footnote4a.org/pd/8565-ncric/insights">NCRIC’s insights page</a> immediately reveals why: NCRIC’s users are nearly
all identified with single, lowercase letters like “a.” or “c.”. These users show remarkably
consistent around-the-clock activity.</p>
<p>NCRIC’s users are either bots, or shared accounts.</p>
<h2>The Plausible Backdoor: Who is “a.”?</h2>
<p>Of course, NCRIC’s deliberate avoidance of oversight and accountability is not direct evidence that
it is sharing data in violation of California law—cops will be cops. But its behavior and context do
lead directly to that question.</p>
<p>It’s possible that NCRIC was suddenly motivated to start doing some police work, and that it has
absolutely terrible internal security practices. Maybe it logs in a terminal “a” and when the next
person reports for their shift, they don’t log in with their own credentials and simply continue
working.</p>
<p>It would violate every basic tenet of information security, not to mention, most likely, several
federal and state laws, but it’s a possibility.</p>
<p>The other, in my opinion more plausible, explanation is that NCRIC shares its user accounts with
external, out-of-state agencies—<a href="https://www.9news.com/article/news/local/local-politics/loveland-police-sharing-license-plate-reader-data-border-patrol/73-807d8c95-5904-4b55-be83-27aafee9638d">just like Loveland, CO</a> was caught doing last year.</p>
<p>Another possible explanation is that these accounts are automated and serve to fill NCRIC’s data
warehouse. Of course, that leads to a follow-up question: who can access the warehouse?</p>
<h3>The Missing RISS</h3>
<p>It is also worth noting that the other relevant fusion center, the <a href="https://www.riss.net/centers/wsin/">Western States Information
Network®</a> (RISS), is conspicuously the only RISS absent from Flock’s audit logs. The other
five are accounted for.</p>
<p>Unlike the FBI, which simply <a href="https://footnote4a.org/pd/9138">stopped showing up in log files after July 2023</a>,<sup class="footnote-ref"><a href="#footnote10">[10]</a><a class="footnote-anchor" id="footnote-ref10"></a></sup>
WSIN does not show up in our data at all. This is the same center that covers Washington: the state
most covered by the logs we have. Either WSIN is the only RISS without Flock access, or it is not
being logged as “WSIN” or some other cognizable variant.</p>
<h2>What the Logs Can’t Show</h2>
<p>The logs can tell us that NCRIC stripped its own security and audit requirements immediately after
California started enforcing its privacy laws. They can tell us that anonymous, bot-like accounts
began running searches around the clock within weeks. They can tell us that the one RISS center
covering the most-logged state in our dataset is conspicuously absent from every log file we have.</p>
<p>What the logs can’t tell us is why — and that’s exactly the point. NCRIC designed its policies to
ensure that no one, including its own director, has the information needed to answer that question.</p>
<p>The “sampling”-based audits don’t require randomness. The access logs don’t require justification.
The retention policy doesn’t require limits.</p>
<p>This is not a gap in oversight. It is the deliberate architecture of unaccountability. When a fusion
center rewrites its policies to remove the very mechanisms that would detect abuse, the question is
no longer whether the data is being shared in violation of California law.</p>
<p>The question is whether anyone with authority to act will bother to find out.</p>
<p>The students from Sequoia Union asked the right questions. The fact that a group of high schoolers
can identify the problems that California’s oversight apparatus declines to investigate is not a
compliment to the students — though they’ve earned one.</p>
<p>It’s an indictment of everyone else.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Even though it may be too late for <em>their</em> deadline, maybe the information can help
someone else. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>The bill permits copying or warehousing of the data within 24 hours of capture, and
then fails to restrict the copied data. The Iowa State Police Association, Axon, and Motorola
all oppose the bill. Flock is undecided. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>Through the Omnibus Crime Control and Safe Streets Act of 1968, whose Section 524(b)
(amended by the Crime Control Act of 1973) resulted in 28 CFR Parts 20 &amp; 23, causing the FBI’s
<a href="https://footnote4a.org/news/federal-insecurity">CJIS Security Policy</a>. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>A RISS center was also behind the FBI’s directive to make searches as “<a href="https://footnote4a.org/news/fbi-investigation">vague as
permissible</a>.” <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>Yet that distinction is only made when it suits—laws that prohibit sharing intelligence data
with private corporations go unenforced, as does Flock’s stated policy on giving private
businesses access to its “law enforcement network.” <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote6" class="footnote-item"><p>Leonardo’s <a href="https://footnote4a.org/blog/leonardo-data-privacy.pdf">Data Privacy statement</a> contains much of the
same vague “local control” and “ethics” language as Flock’s. <a href="#footnote-ref6" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote7" class="footnote-item"><p>Denver’s own retention policy caps at one year—but the warehouse is governed by ATICC’s policy,
which defers to the three years set in § 24-72-113 C.R.S. <a href="#footnote-ref7" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote8" class="footnote-item"><p>A vendor product with a “®” after its name, no less. <a href="#footnote-ref8" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote9" class="footnote-item"><p>It should be noted that police across the state only violated the privacy of millions
of Californians for nearly a decade; it’s not like they <a href="https://globalnews.ca/news/6107615/shoplifter-standoff-home-destroyed/">shoplifted from Walmart</a>. <a href="#footnote-ref9" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote10" class="footnote-item"><p>And claims not to understand what a “contract” is, in response to a FOIA request. <a href="#footnote-ref10" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>audit-log-analysis</category>
        </item>
        <item>
            <title><![CDATA[Who Watches the Watchers? Not the ACLU.]]></title>
            <link>https://footnote4a.org/news/aclu-plates</link>
            <guid isPermaLink="false">https://footnote4a.org/news/aclu-plates</guid>
            <pubDate>Wed, 25 Feb 2026 20:00:00 GMT</pubDate>
            <description><![CDATA[Unredacted audit logs aren't a leak—they're the only functional check on surveillance abuse]]></description>
            <content:encoded><![CDATA[<p>In January, after a Joplin police officer was fired for stalking via Flock’s license plate reader
system, I wrote about <a href="https://footnote4a.org/news/404-eff-plates">why I publish unredacted audit logs</a>. The argument was
simple: as long as Flock can collect this information without restriction, the public must be able to
see how it’s used.</p>
<p>Today, the <a href="https://www.aclu.org/news/privacy-technology/alpr-as-public-data">ACLU has joined EFF in calling for laws</a> that would make that oversight illegal.
It did so on the same day that criminal charges were filed against a Milwaukee police officer for
misuse of the system — as a direct result of the very thing the ACLU is trying to ban.</p>
<h2>The ACLU’s Position</h2>
<p>ACLU and EFF’s assertion that records documenting police activity should be kept behind lock and key
in a police station is, frankly, preposterous. The suggestion has no business coming from
organizations that purport to fight for civil rights and police accountability.</p>
<p>In making its recommendation, ACLU misrepresents the actions of police and the contents of the logs:</p>
<blockquote>
<p>The release of this kind of data is a significant privacy problem. To be clear, web sites have
every right to publish data that has been released by government agencies or that they have
otherwise legitimately obtained; the fault here is the police departments that collected this data
on innocent drivers not suspected of any wrongdoing and then released it unredacted. But this kind
of data could be used by all manner of parties to find out things about the lives of those they’re
interested in \— everyone from abusive romantic partners and stalkers, to political or business
rivals, to everyday busy-bodies and who-knows-who-else.</p>
</blockquote>
<p>Characterizing audit logs as data the police collects on innocent drivers is flat out wrong. Yes,
police <em>do</em> collect data on innocent drivers. But that is not the data that’s in the audit logs.</p>
<p>What’s in the audit logs is what a Flock user—possibly, but not necessarily, a police
officer—entered into the “search” box. For example, there is a result for the plate “<a href="https://haveibeenflocked.com/?l=-"><code>-</code></a>.”
Probably not a valid plate anywhere. I’ve also had to block a few novelty plates, like
<a href="https://www.hoonigan.com/"><code>HOONIGAN</code></a>, from reports because cops keep looking it up.</p>
<p>What <em>is</em> in the logs is search terms being entered into a privately owned and operated, and largely
unregulated, database. Even if you were to make sharing those logs illegal, it does not solve the
issue—the information, by the very nature of the system, is in the hands of a private third party.</p>
<p>The ACLU then tries to compare records of government officials’ search queries to bodycam footage of
private citizens. Video footage of people interacting with police and evidence that someone typed
the word “investigation” into a search box are not the same thing.</p>
<p>Following those dubious claims, the author walks the statement back by saying that “any logs by
officers of the purposes of their searches (which would be subject to existing open-records
exemptions for active investigations) should be considered public records.”</p>
<p>This is exactly how we end up with audit logs like the ones currently served up by Flock’s
ironically-named transparency portals:</p>
<p><img src="https://footnote4a.org/blog/aclu-plates/portal-log.png" alt="Transparency portal logs"></p>
<p>Flock summarizes it correctly in its form email: “<a href="https://footnote4a.org/blog/aclu-plates/flock-portal.pdf">There is nothing the public can gain from this
report</a>.” (“However, if you find your department’s users are not consistently searching off
of incident/case numbers, that may be a reason to hide the Search Audit.”)</p>
<h2>The Contradiction</h2>
<p>The whole system hinges on <em>not</em> containing sensitive information. According to Flock and police,
there are no privacy concerns when you take millions of photos of license plates on public roads.
It’s why a private company can collect the information under color of law and process it without
having probable cause or oversight, and it’s why police can search that same data without warrants.</p>
<p>That framework simply can’t co-exist with the idea that that same information is somehow too
sensitive for public consumption. To claim otherwise is, at best, mistaken.</p>
<p>As it says in this site’s FAQ: I am willing to accept the premise that all of this audit data is too
sensitive to publish, but, if accepting that premise, then the actual photos must be too sensitive
as well. Ban neither or both, but don’t mistake a defense of public oversight for a defense of this
website’s right to exist.</p>
<h2>The Alternatives Don’t Work</h2>
<p>Hiding audit logs for vague privacy concerns is a lazy approach. This website does not display
license plate numbers anywhere. Instead, it provides “identifier” numbers that correspond to license
plates. It’s not a complete solution, but it’s one that’s adequate for identifying patterns of
misuse and abuse.</p>
<p>Flock knows this. It previously took a similar approach to usernames in its transparency portal
logs: instead of identifying a user by name, it identified users with a string of numbers and
letters. While you may not see that Officer Jones did something suspicious, if Officer AF983-90D43
did, that’s still something that can be investigated.</p>
<p>Flock removed those IDs from the logs.</p>
<p>The ACLU’s recommendation that “people should be able to request their own data” is equally
shortsighted. The data is, at least on paper, owned by 6,000 different agencies. Should we all be
doing monthly open records requests to those agencies? Without an up-to-date customer list, how
would we even know where to file the requests? How do we prove to Flock that it’s “our” data? Do we
send Flock, a private mass surveillance company, a photo copy of our ID and car registration?</p>
<p>Meanwhile, police departments across the country write policies saying they will manually audit
hundreds of thousands of searches by downloading a CSV, going through it line-by-line, and making
tens of thousands of phone calls to other departments to ask whether the “investigation” at 4:37pm
last Wednesday was a legitimate search. Closing the chief’s office door won’t get him to suddenly
make the calls.</p>
<p>The real problem isn’t that there is an attempt at public oversight — it’s that every other oversight
mechanism is failing. State and local governments, police agencies, Flock, the FBI, the EFF, and the
ACLU could all actually be working on this problem.</p>
<p>This website shows that national searches are impossible to keep up with due to sheer volume. The
underlying cause is a system that is <a href="search-reaons">disproportionate by default</a>—one that
encourages getting nationwide 30-day location histories for the slightest of reasons, or no reason
at all.</p>
<p>It also shows that some form of oversight may be possible, if we want it to be possible. But we need
to ditch Flock and solve the actual problems.</p>
<h2>ACLU &amp; EFF’s changing position</h2>
<p>In 2014, <a href="https://www.aclusocal.org/news/la-cops-should-release-automatic-license-plate-reader-records/">ACLU SoCal and EFF sued the Los Angeles Police Department and Los Angeles Sheriff’s
Department</a> for ALPR records.</p>
<p>The organizations sought actual ALPR data rather than audit logs, and, after their request for the
data was denied under California’s Public Records Act, they wrote (emphasis mine):</p>
<blockquote>
<p>[T]he intrusive nature of ALPRs and their potential for abuse creates a strong public interest in
disclosure of data that would help shed light on how police are actually using the technology.</p>
<p>…</p>
<p>The data will reveal whether police seem to be targeting political demonstrations to help identify
protestors, or other locations such as mosques, doctors’ offices or gay bars that might yield
highly personal information.</p>
<p><strong>Californians can only properly weigh in on whether police should be using ALPRs and what
policies might be necessary if they understand how police actually use the technology.</strong></p>
</blockquote>
<p>It has been twelve years — we still don’t have that necessary transparency.</p>
<p>ACLU and EFF reversing their position is inexplicable.</p>
<p>@<a href="https://footnote4a.org/blog/aclu-plates/eff-aclu_alpr_opening_brief.pdf" class="collapsible">ACLU SoCal &amp; EFF v. LAPD &amp; LASD</a></p>
<h2>179 Searches, Zero Oversight</h2>
<p>On the same day the ACLU published its recommendation, a criminal complaint was filed in Milwaukee
against MPD police officer Josue Ayala. An excerpt:</p>
<blockquote>
<p>Through the website <a href="http://www.haveibeenflocked.com">www.haveibeenflocked.com</a>, VICTIM ONE became aware that City of Milwaukee
Police Officer Josue Ayala used the Flock system, a license plate recognition platform, to run the
license plate on VICTIM ONE’S personal vehicle to obtain location information for VICTIM ONE on
numerous occasions. VICTIM ONE believed that Officer Ayala ran VICTIM ONE’S license plate over 100
times.</p>
<p>City of Milwaukee Police Detective Tehrangi Chapman conducted follow up investigation by having an
audit trail run in the FLOCK system for the time frame of March 26, 2025, through May 26, 2025.
During that time frame City of Milwaukee Police Officer Josue Ayala ran the license plate of
VICTIM ONE a total of 55 times. The audit trail revealed that Officer Josue Ayala also conducted a
search of a second license plate number belonging to VICTIM TWO a total of 124 times during the
same time frame. During the time frames that Officer Ayala conducted the searches of each license
plate, Officer Ayala was on duty working for the City of Milwaukee Police Department.</p>
<p>The Flock system requires the user to enter a reason for the license plate search. On each
occasion that Officer Ayala used the Flock system to search for license plate of VICTIM ONE or
VICTIM TWO, Officer Ayala listed the reason for conducting the search as “investigation”</p>
</blockquote>
<p>I’ll spare the technical details here, but the discrepancy between the victim’s reported number
(over 100) and the audit’s number (55) is <a href="https://footnote4a.org/news/secret-searches">explained by redactions</a>; the
inaccuracy is a direct consequence of deliberate obfuscation.</p>
<p>The policy violation should have been caught by Milwaukee PD during its regular audits.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>If the CJIS framework applies, which Flock often implies, this should have been caught by the
Wisconsin Department of Justice, which oversees Milwaukee PD. If the DOJ had missed it, the FBI’s
CJIS division should have caught it.</p>
<p>If these were state or nationwide searches, as most searches are, this should also, independently,
have been caught by all the other involved departments.</p>
<p>No independent auditors exist, nor does Flock audit anything.</p>
<p>In fact, <a href="fbi-investigation">the FBI and Flock’s recent changes</a> were explicitly designed to make it
more difficult to catch exactly this type of violation.</p>
<p>Nobody in an ostensibly multi-layered system of oversight caught the problem; once again it was a
private citizen—the victim in this case—who had to do the job public officials promised they’d do.
And again, the problem came to light as a result of complete, unredacted audit log
information—including license plate numbers.</p>
<p>In January, public audit logs got an officer fired. Today, they got one criminally charged. The ACLU
wants to make sure there isn’t a third time.</p>
<p>Now that Flock has deleted the information that made both cases possible, any future similar
incidents will almost certainly go unnoticed. As long as there are no alternatives for effective
oversight, and as long as there is unregulated privatized surveillance, public audits are the best
we can hope to do.</p>
<p>I will continue advocating for exactly that.</p>
<div class="markdown-alert markdown-alert-note">
<p class="markdown-alert-title">Note</p>
<p><strong>Update 2/25 11pm</strong>: The ACLU of Wisconsin issued its own response to the Ayala charges, calling
for transparency standards including “annual public reporting on surveillance technology
acquisition and use across the state.” The statement cites a Wisconsin Examiner report that MPD
logged “investigation” as its search justification over 1,000 times in 2025 — a statistic derived
from the same audit log data the national ACLU wants exempted from public records.</p>
</div>
<hr>
<p class="text-sm">2/28/2025: Updated with ACLU/EFF lawsuit information.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>I’m simply assuming Milwaukee PD has a policy to regularly audit logs. If not, it does not
diminish the point. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>audit-log-analysis</category>
        </item>
        <item>
            <title><![CDATA[Twenty-Eight]]></title>
            <link>https://footnote4a.org/news/flock-access</link>
            <guid isPermaLink="false">https://footnote4a.org/news/flock-access</guid>
            <pubDate>Wed, 25 Feb 2026 18:00:00 GMT</pubDate>
            <description><![CDATA[Flock says 28 employees can access federally protected criminal justice information. Their own paperwork says otherwise.]]></description>
            <content:encoded><![CDATA[<p>As of December 2025, these were the 28 people who have access to Flock’s data, according to Flock
and Story County, Iowa. The last names have been shortened, in case the signatures weren’t strictly
voluntary, but they are a matter of public record.</p>
<p>You can request the full, current list from any agency using Flock—federal policy requires them to
have it available; the company’s concern about speculative “<a href="https://footnote4a.org/news/colwell-files">officer safety</a>”
scenarios apparently does not extend to its own employees, whose names and signatures are being
filed into public records as a matter of course — hopefully with their knowledge and consent.</p>
<div class="grid grid-cols-3 gap-x-6">
<ul>
<li> Aaron P.</li>
<li> Adam S.</li>
<li> (illegible)</li>
<li> Adrian W.</li>
<li> Aishwarya P.</li>
<li> Alana J.</li>
<li> Aleyandra L.</li>
<li> Alex M.</li>
<li> Alexandra B.</li>
<li> Amanda B.</li>
</ul>
<ul>
<li> Amy P.</li>
<li> Anthony E.</li>
<li> (illegible)</li>
<li> Arash S.</li>
<li> Baasit A.</li>
<li> Benjamin K.</li>
<li> (illegible)</li>
<li> Blake M.</li>
<li> (illegible)</li>
</ul>
<ul>
<li> Brandon E.</li>
<li> Brett H.</li>
<li> (illegible)</li>
<li> (illegible)</li>
<li> Carrie V.</li>
<li> (illegible)</li>
<li> Chandler E.</li>
<li> Christopher S.</li>
<li> Clinton M.</li>
</ul>
</div>
<p><img src="https://footnote4a.org/blog/flock-access/signature.png" alt="Flock employee signature" class="float-right ml-8"></p>
<p>To be clear, the “illegible” signatures are completely illegible—but apparently still sufficient for
Flock, Story County, Iowa, the Iowa Department of Public Safety, and the FBI.</p>
<p>These 28 Flock employees signed the following statement:</p>
<blockquote>
<p>I hereby certify that I am familiar with the contents of (1) the Security Addendum, including
its legal authority and purpose; (2) the NCIC Operating Manual; (3) the CJIS Security Policy; and
(4) Title 28, Code of Federal Regulations, Part 20, and agree to be bound by their provisions.</p>
<p>I recognize that criminal history record information and related data, by its very nature, is
sensitive and has potential for great harm if misused.</p>
<p>I acknowledge that access to criminal history record information and related data is therefore
limited to the purpose(s) for which a government agency has entered into the contract
incorporating this Security Addendum.</p>
<p>I understand that misuse of the system by, among other things: accessing it without authorization;
accessing it by exceeding authorization; accessing it for an improper purpose; using,
disseminating or re-disseminating information received as a result of this contract for a purpose
other than that envisioned by the contract, may subject me to administrative and criminal
penalties.</p>
<p>I understand that accessing the system for an appropriate purpose and then using, disseminating or
re-disseminating the information received for another purpose other than execution of the contract
also constitutes misuse.</p>
<p>I further understand that the occurrence of misuse does not depend upon whether or not I receive
additional compensation for such authorized activity. Such exposure for misuse includes, but is
not limited to, suspension or loss of employment and prosecution for state and federal crimes.</p>
</blockquote>
<p>This certification, along with a fingerprint-based background check, is a requirement under the
<a href="https://footnote4a.org/news/federal-insecurity">CJIS Security Policy</a>:</p>
<blockquote>
<p>This section’s security terms and requirements apply to all personnel who have unescorted access
to unencrypted CJI.  Regardless of the implementation model – physical data center, virtual cloud
solution, or a hybrid model – unescorted access to unencrypted CJI must be determined by the
agency taking into consideration if those individuals have unescorted logical or physical access
to any information system resulting in the ability, right, or privilege to view, modify, or make
use of unencrypted CJI. — <a href="https://le.fbi.gov/cjis-division/cjis-security-policy-resource-center/cjis_security_policy_v5-9-5_20240709.pdf">CJIS Security Policy</a>, v5.9.5, § 5.12, p. 212.</p>
</blockquote>
<p>Note that the policy is explicit about “logical or physical access.”</p>
<p>Iowa DPS puts it in even clearer terms in a guidance document:</p>
<blockquote>
<p>All private contractors who perform criminal justice functions shall acknowledge, via signing of
the Security Addendum Certification page, and abide by all aspects of the CJIS Security Addendum —
Iowa DPS, <a href="https://footnote4a.org/blog/flock-access/reqs.pdf">Requirements Document FBI CJIS Security Policy Version
5.3</a>&quot;,<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> p. 9</p>
</blockquote>
<p>There only being 28 employees who would need to certify is … at best, implausible.</p>
<p>Yet, after months of back and forth between Story County and the Iowa Department of Public Safety,
this is the list Flock and the county attorney produced.</p>
<h2>Who is Missing</h2>
<p>Any Flock employees with access and a first name that starts with D–Z. Unless there aren’t any, but
that seems improbable.</p>
<p>We know that Flock “LPR” cameras contain <a href="https://www.youtube.com/watch?v=uB0gr7Fh6lY">unencrypted photos and videos</a>. The CJIS Security
Policy is clear that anyone with physical access to CJI should be on the list; that would include
all (subcontractor) installers. The alternative, that the footage stored on the devices is not CJI,
renders it non-confidential and, in most states, a public record.</p>
<p>For the reported issue where <a href="https://www.youtube.com/watch?v=vU1-uiUlHTo">Flock cameras were publicly exposed on the Internet</a>, Flock’s
Chief Legal Officer Dan Haley has downplayed the severity of the “<a href="https://footnote4a.org/news/never-hacked-facts">not a hack</a>” by claiming it
was a “configuration error” perpetrated by Verizon.</p>
<p>If Verizon’s employees can configure the system to expose the information, they have access
sufficient to trigger the certification requirement. Flock does not consider this to be a security
incident, implying Verizon personnel have authorized access, yet they do not appear to be on the list.</p>
<p>The list should also include of all <a href="overseas-data">Flock’s Upwork contractors</a>, whoever has access
to its <a href="dps-denmark">Danish screen-recorder</a>, and, assuming these are Flock’s own accounts, anyone using
<a href="https://haveibeenflocked.com/pd/8265-flock-city-pd-law-enforcement-demo/">Flock City PD - Law Enforcement Sales</a>, <a href="https://haveibeenflocked.com/pd/6690-flock-city-pd-law-enforcement-sales-demo/audit?sort=date_desc">Flock City PD - Law Enforcement Sales Demo</a>,
<a href="https://haveibeenflocked.com/pd/8897-flock-rtcc/audit?sort=date_desc">Flock RTCC</a>, <a href="https://haveibeenflocked.com/pd/9188-flock-safety-admins/audit?sort=date_desc">Flock Safety Admins</a>, <a href="https://haveibeenflocked.com/pd/9214-flock-safety-customer/audit?sort=date_desc">Flock Safety Customer</a>, <a href="https://haveibeenflocked.com/pd/9275-flock-safety-engineering/audit?sort=date_desc">Flock Safety
Engineering</a>, <a href="https://haveibeenflocked.com/pd/9153-flock-safety-sales/audit?sort=date_desc">Flock Safety Sales</a>, <a href="https://haveibeenflocked.com/pd/9196-flock-safety-campus-security-training/audit?sort=date_desc">Flock Safety Campus Security Training</a>,
<a href="https://haveibeenflocked.com/pd/9170-flock-safety-le-training/audit?sort=date_desc">Flock Safety LE Training</a>, <a href="https://haveibeenflocked.com/pd/7765-flock-safety-sales/audit?sort=date_desc">Flock Safety Sales</a>, and <a href="https://haveibeenflocked.com/pd/9185-florida-le-flock-training/audit?sort=date_desc">Florida LE Flock
Training</a>, which all run on production data (i.e. real people’s movements are regularly
being searched for Flock’s sales and training purposes).</p>
<p>Notably, Robert Otten, Flock’s “Head of Security, Risk and Compliance” (or similar titles), attested
to each of the 28 signatures but did not certify his own adherence to the CJIS Security Policy. A
suspicious absence, if the list were complete.</p>
<h2>What is Missing</h2>
<p>Around 6,000 contracts, based on Flock’s reported number of government customers. These
certifications are tied to specific CJIS addenda, which are tied to specific contracts, via “the
contract incorporating this Security Addendum.” Each person on the list needs to read each of
Flock’s contracts and sign the certification that says they understand the “purpose” valid for each
individual contract.</p>
<p>This is clearly unworkable; it is a recognized, and “solved” problem. Some states centralize their
processing for these certifications. In those states, vendor employees can certify with the state
<abbr class="md-tooltip" data-tooltip="CJIS Systems Agency">CSA</abbr> (typically state police or department of public safety), who retains their background check and
information on file to share with other agencies using the same vendor.</p>
<p>In those states, vendor employees file a single certification with the <abbr class="md-tooltip" data-tooltip="CJIS Systems Agency">CSA</abbr>, and simply claim that
they will not use it for a purpose not allowed by any of its employer’s contracts, past, present, or
future, without ever seeing the contract. It’s questionable, but the FBI does not appear to have a
problem with it so far.</p>
<p>But not all states have such a system in place. For those states, each employee needs to sign this
piece of paper for each contract.</p>
<p>The issue is further complicated by Flock’s position that its contractual terms, which it <a href="https://footnote4a.org/news/terms-feb2026">recently
altered</a>, are negotiable and each customer can have a bespoke contract. If
employees need to adhere to the terms of the contract they must, necessarily, read those contracts.</p>
<p>Of course, if Flock were to take the other position — that its terms are not negotiable — its
contracts may qualify as contracts of adhesion, which <a href="https://footnote4a.org/news/terms-feb2026">raises its own set of
problems</a>.</p>
<h2>Who is Not Missing</h2>
<p>Some easy to find job titles for the folks on the list:</p>
<ul>
<li>UI/UX Designer &amp; Brand Visionary</li>
<li>User Experience and Service Designer</li>
<li>Policy Manager (former federal prosecutor, hired from the U.S. Attorney’s Office)</li>
<li>Principal Product Manager</li>
<li>Manager, Solutions Engineering</li>
</ul>
<p>There is no reason a UI/UX designer and/or brand visionary should have access to production data.
This is not only a common-sense security practice, but a requirement for both SOC.2 and ISO27001
certification—both of which Flock claims to possess.</p>
<p>And that’s for ordinary production data; those rules apply to companies that sell caps for your
ballpoint pen or that do made-to-measure T-shirts for your dog. Here, we’re talking about federally
protected criminal justice information.</p>
<p>In any case, apparently it’s more important for a brand visionary to have access to CJI than for the
Head of Security, Risk, and Compliance.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<h2>What it Means</h2>
<p>There are only two explanations for what this list represents:</p>
<ol>
<li>Flock has narrowed CJI access to 28 people — in which case several of those people have no
business being on the list, Otten’s absence is inexplicable, and the company’s field technicians,
Upwork contractors, and demo account users are all operating in violation of federal law; or—</li>
<li>Flock certifies everyone and handed over only a subset to make the records request go away.</li>
</ol>
<p>Both explanations end in the same place.</p>
<p>Every day, Flock cameras record the movements of millions of people who never consented to
surveillance and have no way to verify how their data is handled, needing to rely on Flock’s vague
assurances that it is “CJIS certified.”</p>
<p>The CJIS Security Policy exists because criminal justice information and criminal history record
information is dangerous when mismanaged. Flock’s own paperwork — the paperwork they produced to
prove compliance — is the evidence that they aren’t complying.</p>
<p>And the certification itself? It’s a document that exposes individual signers to federal criminal
prosecution for misuse of CJI.</p>
<p>When Flock runs sales demos on production data — real people, real movements, real criminal justice
information — it’s not Flock’s name on the line. It’s the employee’s. The company that built the
system, sold the system, and decided to use live data for training walks away clean. The designer
who was told to sign something during onboarding risks federal charges.</p>
<p>Twenty-eight names. Some illegible, one conspicuously absent, and no reason to believe the list is
even remotely complete. But every one of them signed on the dotted line — and not one of them is
Flock.</p>
<hr>
<p><em class="text-sm">I am not an attorney. This analysis reflects my interpretation of CJISSECPOL, contract language,
and law, and is subject to change. Contracting agencies should consult qualified attorneys regarding
their specific agreements.</em></p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>CJIS Security Policy 5.3 is no longer in use, but DPS does appear to publish a newer revision
of its requirements document. The substance of the policy is the same between v5.3 and v5.9. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>To be clear: neither role has any business accessing this data, but if you had to pick
one … <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>foia-transparency</category>
        </item>
        <item>
            <title><![CDATA[All the Attorney General's Men: As Transparent as a One-Way Mirror]]></title>
            <link>https://footnote4a.org/news/coralville-ag</link>
            <guid isPermaLink="false">https://footnote4a.org/news/coralville-ag</guid>
            <pubDate>Tue, 24 Feb 2026 21:00:00 GMT</pubDate>
            <description><![CDATA[How a complaint to Iowa's AG about Coralville's unenforceable ALPR policy forced a choice—and revealed the AG's selective relationship with transparency.]]></description>
            <content:encoded><![CDATA[<p>One of the very first posts on this blog was “<a href="https://footnote4a.org/news/coralville-contract">All the Chief’s Men: How Coralville’s Flock Contract
Bypassed Oversight</a>”. It described how the Coralville Chief of Police
signed a Flock contract without lawful authorization. When the Coralville public found out about the
contract, they rallied in force and briefed the Coralville city council on Flock, including its
supposed “<a href="https://www.404media.co/cbp-had-access-to-more-than-80-000-flock-ai-cameras-nationwide/">federal pilot programs</a>.” All of it fell on deaf ears. When the AG finally
stepped in and threatened to cut off state funding, the City finally listened.</p>
<h2>The Policy</h2>
<p><a href="https://acrobat.adobe.com/id/urn:aaid:sc:VA6C2:edbfe9d4-4aac-4f14-ab93-c356702c9fbc">Coralville’s ALPR policy</a>,<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> is a typical <a href="https://www.lexipol.com/platform/policies-and-updates/">Lexipol</a>-generated exercise in legal
copy-pastery, virtually identical to <a href="https://northlibertyiowa.org/wp-content/uploads/2024/11/Automated_License_Plate_Readers__ALPRs_.pdf">neighboring North Liberty’s policy</a>,<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup>
but with the following, largely inoffensive, section:</p>
<p><img src="https://footnote4a.org/blog/coralville-ag/policy.png" alt="Coralville Policy 427.4.1" width="500"></p>
<p>That section was copy-pasted from <a href="https://public.powerdms.com/CRPDIA/tree/documents/139229">Cedar Rapids’ policy</a>, but it adds the non-sensical
“protected characteristic” of infringing on the First Amendment, and a prohibition on use “[s]olely
for immigration purposes”.</p>
<p>That “immigration purposes” clause was added in response to pressure from the public against the
backdrop of increasingly aggressive ICE raids in <a href="https://www.themarshallproject.org/2025/12/18/ice-chicago-immigration-blitz-data"><em>Operation Midway Blitz</em></a> in Chicago.</p>
<p>Coralville’s policy was always performative. Its prohibitions were unenforceable, and various
aspects made no sense or made specific reference to the laws they facially clashed with. The
Chief’s proposed policy only provided for secret oversight done exclusively within the police
department with no mandatory reporting or penalties for violations—a fact specifically called out at
the council meeting where the policy was adopted.</p>
<p>To dispel any notion that this was bad policy made in good faith: once the policy was adopted, the
city almost immediately violated its own directive not to automatically share data with agencies
outside Johnson County.</p>
<p>Residents noticed on the Coralville Flock transparency portal that Coralville PD had given Cedar
Rapids (in neighboring Linn County) access. When asked about this by the public and the media—who
all interpreted 427.7 as a ban on granting this type of unfettered, indefinite automated access to
agencies outside Johnson County—the PD justified its actions by stating that Flock’s automatic
sharing was fine because the <em>request</em> for automatic sharing had been made manually.<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup></p>
<p>The Coralville Police Chief clearly has no qualms about sharing data. The Chief had already signed a
two-year deal for mass surveillance after only talking to the City Administrator and without
involving the city council, the city attorney, or finance; if he had been approached by state or
federal agencies for access to Flock, there is no doubt in my mind that he would have granted it.</p>
<p>More so if the AG would follow the state playbook of mildly threatening sanctions, up to withholding
all of a city’s state funding, for violating <a href="https://www.legis.iowa.gov/docs/code/27A.pdf">Iowa Code Chapter § 27A.4(1)</a>:</p>
<blockquote>
<p>A local entity shall not adopt or enforce a policy or take any other action under which
the local entity prohibits or discourages the enforcement of immigration laws.</p>
</blockquote>
<p>Granting access for immigration purposes would be the path of least resistance for Coralville PD and
its city administrator: the policy prevents oversight, and as long as the feds have access they
won’t complain.</p>
<p>AG Bird has so far declined to enforce Iowa’s laws prohibiting surveillance data, or its laws on
data security, consumer protection, or privacy, but she <em>has</em> threatened to use Chapter 27A to
<a href="https://www.governing.com/management-and-administration/iowa-ag-moves-to-strip-county-of-all-funding-over-immigration-post">revoke funding for an entire county</a> because its Sheriff dared distinguish between
administrative and judicial warrants on Facebook.</p>
<h2>The Gambit</h2>
<p>For us folks who like their privacy, the gambit was clear then: file a complaint with the Iowa
Attorney General about Coralville’s unlawful policy on the theory that if the AG acted, Coralville
would have a choice:</p>
<ol>
<li>Amend the policy. They’d need another public meeting, where the City Council, its Chief of
Police, and its City Administrator, would have to face an increasingly disgruntled public’s &quot;I
told you so&quot;s. They would have to tell the public they would be stripping the core protection
they had emphatically promised only a few months earlier, after ICE had ratcheted up
<a href="https://www.publicrightsproject.org/minnesota-v-noem-operation-metro-surge-fact-sheet/"><em>Operation Metro Surge</em></a> in Minneapolis.</li>
<li>Defy the Attorney General and risk being in an indefensible position in a legal battle that would
put state funding on the line for a city of 22,000 that’s already <a href="https://www.coralville.org/648/City-Debt">$340M in debt</a>, due to
questionable financial decisions involving funding a private hotel and a video game arena.</li>
<li>Cancel the contract.</li>
</ol>
<p>The violation in Coralville was much more direct than the Facebook post in rural Winneshiek County.</p>
<p>The Republican-led Capitol also has a long history of conflict with dark-blue Johnson County and its
cities—including Coralville.</p>
<p>@<a href="https://footnote4a.org/blog/coralville-ag/ag-complaint.pdf" class="collapsible">October 2, 2025, AG Complaint Re: Coralville</a></p>
<p>I submitted the complaint by email as a PDF attachment. When I followed up a month later, I received
a response:</p>
<blockquote>
<p>Thank you for contacting the Iowa Attorney General’s Office. We have reviewed your concerns. The
attachments referenced were not included with your email. Please forward those to our office so we
can have them reviewed.</p>
</blockquote>
<p>How the AG managed to review the complaint without receiving the attachments remains a mystery.</p>
<p>By January, after repeated attempts to deliver the complaint,<sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup> I was ready to chalk it up to
more inaction rather than lack of transparency, when I unexpectedly got word Coralville had been in
contact with the Attorney General.</p>
<p>The AG had directed Coralville to “remov[e] Section 427.4.1(d) from Policy 427 [to] resolve the
pending complaint in full.”<sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup></p>
<p>@<a href="https://footnote4a.org/blog/coralville-ag/ag-letter1.pdf" class="collapsible">December 16, 2025 letter from Attorney General to Coralville</a></p>
<p>Coralville city staff immediately acted to make changes to the city’s website and recommended that
the offending language be removed from the PD’s policy. The AG considered this an acceptable
solution.</p>
<p>@<a href="https://footnote4a.org/blog/coralville-ag/ag-letter2.pdf" class="collapsible">January 20, 2026 letter from Attorney General to Coralville</a></p>
<h2>The Fallout: A Cancelled Contract and Transparency</h2>
<p>Amending city policy requires council action. The Coralville City Council scheduled a work session
following its next regular council meeting to discuss the AG’s letter. The Coralville community once
again <a href="https://www.youtube.com/watch?v=_mIWPNSfCZk#t=9m57s">showed up and spoke out</a>. It was effective: the council placed “Cancel the contract”
on the agenda for its next meeting.</p>
<p>The $36,000 surveillance system that Chief Nicholson smuggled past his own city council, that the
council spent months defending with contradictory and increasingly desperate arguments, that Flock’s
own representative admitted was ungovernable by local policy — will be coming down.</p>
<p>But AG Bird did something else deserving mention: she placed my name in the opening sentence of the
letter to Coralville. It is a choice to so readily disclose the identity of a complainant against a
police department on a topic as politically charged as immigration enforcement.</p>
<p>It’s an especially unexpected level of transparency for an AG currently appealing a district court’s
order that the Iowa Public Information Board (IPIB) must do its job and handle (not validate,
<em>handle</em>) an open records complaint concerning Flock camera locations.<sup class="footnote-ref"><a href="#footnote6">[6]</a><a class="footnote-anchor" id="footnote-ref6"></a></sup></p>
<p>The Court of Appeals has been weighing that case since early last summer, which could mean the AG is
not going to get a one-page order with an easy procedural win against a <em>pro se</em> appellee. That
would be embarrassing (<em>Update 2/25</em>: Not 12 hours after posting this, the Court of Appeals affirmed
the trial court decision—i.e., I prevailed).</p>
<p>The kicker is that, in the Coralville case, the original complaint is almost certainly a
confidential public record under <a href="https://www.legis.iowa.gov/docs/code/22.pdf">Iowa Code § 22.7(18)</a>. This is the “whistleblower protection”
clause cities have used to hide community camera registries they have integrated with Axon’s Fusus
(a “fusion center” software product similar to Flock’s “FlockOS”).</p>
<blockquote>
<p>Communications not required by law … to the extent that the government body … could reasonably
believe that those persons would be discouraged from making them to that government body if they
were available for general public examination.</p>
</blockquote>
<p>But, as I’ve noted while arguing with various state and local officials: the Iowa Open Records Act
does not <em>require</em> agencies to withhold confidential public records, it merely <em>permits</em> it. The
complaint was likely protected; the AG chose to disclose it anyway—while simultaneously litigating
to <em>prevent</em> disclosure of public records in the IPIB case.</p>
<p>She exercises discretionary transparency when it serves <em>her</em>, rather than the public. She fights it
when the roles are reversed.</p>
<h2>The Cancellation</h2>
<p>The gambit worked: on February 24, Coralville <a href="https://www.youtube.com/watch?v=ZVWbSlqblIo">voted to end its contract with Flock</a>.
Within a span of weeks, both Iowa City and Coralville have instructed Flock to remove its AI
surveillance cameras from public roadways. Although Iowa City is its own island within the state,
this is a major victory in a state whose legislature is staunchly uncritical of police.</p>
<p>AG Bird got the outcome she wanted: the immigration clause is gone. But the community got the
outcome it wanted: the cameras are coming down.</p>
<p>The AG’s selective transparency—naming a complainant against a police department while fighting to
keep surveillance records secret—tells you everything you need to know about which side of the
one-way mirror she prefers to stand on.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>In case Coralville takes down that copy, <a href="https://footnote4a.org/blog/coralville-ag/alpr-policy.pdf">use this one</a> <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>In case North Liberty takes down that copy, <a href="https://footnote4a.org/blog/coralville-ag/alpr-policy-2.pdf">use this one</a> <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>Rather than revoking access and invoking plausible deniability, Coralville PD took a
position only defensible under an extremely strict interpretation of the policy—a legally
desperate position further solidifying the idea that CPD was misleading the public. It’s a
move that screams “Flock.” <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>I resubmitted everything, and provided the files as a download link on November 5. I never heard back
<em>at all</em> from the AG, despite following up six times between that date and the end of the year only
to confirm receipt of the “missing” PDF. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>The AG also referenced a “challenged statement relating to ‘Strict Access’” on the City website.
It’s not entirely clear to me what they mean by this, but it may refer to the transparency portal. <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote6" class="footnote-item"><p>To be clear: IPIB was only ordered to accept and investigate the complaint—the court did
not address whether the complaint had merit. <a href="#footnote-ref6" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>contract-procurement</category>
        </item>
        <item>
            <title><![CDATA[Eighteen Years of Nightly Lineups]]></title>
            <link>https://footnote4a.org/news/dot-frt</link>
            <guid isPermaLink="false">https://footnote4a.org/news/dot-frt</guid>
            <pubDate>Mon, 23 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Iowa's DOT has run nightly facial recognition scans on millions of driver's license photos for eighteen years. In the past four, the scans have led to 14 criminal charges and zero recorded convictions.]]></description>
            <content:encoded><![CDATA[<p>Every night for the past eighteen years, the Iowa Department of Transportation has
scanned the face of every new driver’s license applicant against its entire photo
database. When its algorithm decides two faces look alike, an investigator pulls
credit histories, utility bills, social media posts, and criminal records into a
file. No warrant. No probable cause. No indication of fraud. Just a machine’s
say-so.</p>
<p>In response to an open records request, the DOT initially said it didn’t know
how many of these investigations led to convictions — or even to license
denials. It could confirm only that between January 2022 and November 2025,
there were 192 such cases.</p>
<p>The DOT promised to compile outcome data by early January and delivered—albeit a
bit late. The <a href="https://footnote4a.org/blog/dot-frt/dot-frt.xlsx">spreadsheet</a> tells a remarkable
story: of the 192 investigations, 28 led to no action of any kind, and only 14
resulted in criminal charges. The spreadsheet does not record whether any of
those charges led to convictions.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>This has been happening since at least 2008. And, of course, the FBI has been
tapping into Iowa’s database since <a href="https://footnote4a.org/blog/dot-frt/MOU-2014.pdf">at least 2014</a>.</p>
<p>Iowa is not unique, but its story illustrates, in granular detail, how the
federal government and state DMVs have quietly built one of the largest
surveillance infrastructures in American history — and how the agencies
operating it have no idea whether it works.</p>
<h2>How It Started</h2>
<p>In 2005, Congress passed the REAL ID Act. A year later, <a href="https://www.secureidnews.com/news-item/iowa-selects-digimarc-facial-recognition-solution-to-enforce-one-driver-one-license/">the Iowa DOT awarded a
$1.4 million contract to Digimarc</a> for facial recognition technology.
The system was sold to the public as a fraud-prevention tool, but the contract
embedded capabilities well beyond that purpose:</p>
<blockquote>
<p>Iowa DOT will implement both “one-to-one” and “one-to-many” facial recognition
as part of its driver license enrollment process.</p>
</blockquote>
<p>“One-to-one” matching — comparing a renewal photo to the applicant’s prior
photo — is the anti-fraud use case the DOT advertised. “One-to-many” matching is
something else entirely: it scans each new portrait against the full database of
driver’s license images. As the press release noted:</p>
<blockquote>
<p>Each night, the Biometric Identification system checks each newly captured
portrait against the full database of driver license images as another means
to catch attempts by a single individual to get a driver license under
multiple names.</p>
</blockquote>
<p>The DOT pitched this to the public as a civil anti-fraud measure. But it also
built out infrastructure with latent capabilities for criminal investigation—
and, as it turns out, civil immigration enforcement—capabilities it would
formalize with law enforcement partners in the years to come.</p>
<p>By 2007, the nightly scans were <a href="https://who13.com/news/facial-recognition-dot-helps-catch-40-year-fugitive/">operational</a>. Digimarc, the original
vendor, was subsequently acquired through a chain of corporate mergers: first by
Safran’s Morpho division (later MorphoTrust USA), then by <a href="https://en.wikipedia.org/wiki/IDEMIA">IDEMIA</a>, which
<a href="https://www.prnewswire.com/news-releases/idemia-partners-with-iowa-department-of-transportation-to-launch-next-generation-mobile-id-technology-301973008.html">continues to partner with the Iowa DOT</a> as of 2024.</p>
<p>The algorithm has changed hands repeatedly, but neither the DOT nor any external
body has ever tested its accuracy for the purpose Iowa uses it — flagging
potential fraud from a pool of millions.</p>
<h2>The FBI Moves In</h2>
<p>In 2014, the Iowa Department of Public Safety signed an agreement with the DOT
to pay for an upgrade to its facial recognition system in exchange for access to
it.</p>
<p>According to <a href="https://www.perpetuallineup.org/jurisdiction/iowa">Georgetown Law’s <em>The Perpetual Lineup</em></a>, this gave DPS
authorized personnel the ability to run face recognition searches against Iowa’s
driver’s license photos.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<p>That same year, the DOT signed its <a href="https://footnote4a.org/blog/dot-frt/MOU-2014.pdf">first Memorandum of
Understanding</a> with the FBI, granting the Bureau
access to those same photos through its Facial Analysis, Comparison, and
Evaluation (FACE) Services unit. A <a href="https://www.gao.gov/products/gao-16-267">2016 GAO report</a> confirmed
that the FBI could request searches of Iowa’s driver’s license database.</p>
<p>The Iowa MoU was <a href="https://footnote4a.org/blog/dot-frt/FBI-DOT.pdf">updated in 2018</a>, superseding the
original agreement. Under its terms, the FBI submits a probe photo to the DOT,
the DOT searches its facial recognition database, and returns a set of candidate
photos and identities. The DOT agreed to process up to 15 photo requests per
day, but the number it actually processes is not known.</p>
<p>Iowa is hardly alone. In response to a FOIA request about Iowa’s program, the
FBI provided a stack of MoUs from other states instead of the Iowa-specific
records that would have been responsive.<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup> Those documents show that at
least fifteen states have signed similar agreements with the FBI.</p>
<p>By May 2019, 21 states had partnered with FBI FACE Services, giving the Bureau
access to <a href="https://www.gao.gov/products/gao-19-579t">over 641 million photos</a> across all searchable
repositories.</p>
<p>@<a href="https://footnote4a.org/blog/dot-frt/FBI-DOT.pdf" class="collapsible">MoUs provided by the FBI</a></p>
<h2>The Nightly Dragnet, to Start With</h2>
<p>The nightly scan is called the Automated Biometric Identification System (ABIS).
It has been running every night for eighteen years, telling the DOT’s Bureau of
Investigation &amp; Identity Protection (BIIP) who to investigate next — not because
there is any indication of fraud, but purely on the output of a commercial facial
recognition algorithm.</p>
<p>These investigations are warrantless and deeply invasive. DOT procedure
specifies:</p>
<blockquote>
<p>When a driver’s license case is first assigned for investigation, the
Investigator shall gather all pertinent documents and information related to
the investigation.</p>
<p>This includes the complete driving and vehicle ARTS records, specific driving
violation records, Accurint check from DPS, or a CLEAR report from a Bureau
investigator and criminal history to start with.</p>
<p>— Iowa DOT, <em>Procedures Related to Driver License Investigations</em>, p. 176</p>
</blockquote>
<p>@<a href="https://footnote4a.org/blog/dot-frt/manual.pdf" class="collapsible">Procedures Related to Driver License Investigations, p. 176</a></p>
<p>A commercial algorithm — for which we have no data regarding accuracy or
bias — says your photo looks like one of millions of others. On that basis alone,
a DOT investigator pulls your credit history, utility bills, social media posts,
criminal history, and every other detail they can find about you into a file. “To
start with.”</p>
<p>Although we still don’t have no data on the DOT’s system’s accuracy, we at least
have part of the story now: DOT records show that of 192 investigations opened
between January 2022 and November 2025 (excluding 19 still-open cases and one
duplicate):<sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup></p>
<ul>
<li>
<p>28 investigations (16%) resulted in no action whatsoever. No administrative
sanction, no criminal referral. The algorithm flagged these people, an
investigator pulled their credit histories and criminal records, and then
closed the file. Whether the subjects were ever told they’d been investigated
is unknown.</p>
</li>
<li>
<p>130 investigations (76%) resulted in administrative action only — mostly
license cancellations, but also 20 cases where the sole action was “Merge
Records,” which appears to be database housekeeping.</p>
</li>
<li>
<p>14 investigations (8%) resulted in criminal charges. That is 3.5 per year.
The charges are overwhelmingly misdemeanors: “Fraudulent Application for
DL/ID,” “False Application for DL/ID,” perjury. A handful involved more
serious offenses — identity theft, forgery, fraudulent practice. One case
resulted in no Iowa charges at all; the subject was extradited to Nebraska on
an existing warrant.</p>
</li>
<li>
<p>Zero convictions are recorded. The DOT’s spreadsheet tracks charges filed, not
final outcomes. After eighteen years and 192 documented investigations, the
agency still cannot say whether a single criminal referral from its facial
recognition program has ever resulted in a conviction.</p>
</li>
</ul>
<p>One additional detail stands out: in April 2025, an administrative action reads
“Notified Homeland Security and <abbr class="md-tooltip" data-tooltip="Iowa Department of Revenue">IA DOR</abbr>.”</p>
<p>The nightly scan, sold to the public as a fraud-prevention tool, appears to have
been used for federal immigration enforcement, as those agencies <a href="https://arstechnica.com/tech-policy/2025/11/us-gives-local-police-a-face-scanning-app-similar-to-one-used-by-ice-agents/">continue to
push facial recognition mobile app on local police</a>.</p>
<h2>Blind Faith in a Blind System</h2>
<p>Facial recognition algorithms are notoriously biased, performing worse on people
with brown or black skin than on those with white skin. This is a technical
reality, not an advocacy position.</p>
<p>In 2016, the Government Accountability Office examined the FBI’s facial
recognition program and <a href="https://www.gao.gov/products/gao-16-267">made six recommendations</a>. The GAO found
that the FBI had tested its system’s detection rate only for candidate lists of
50, and had no data on accuracy for smaller list sizes that users regularly
requested. The GAO also recommended the FBI determine whether the external state
systems it relies on — systems like Iowa’s — were sufficiently accurate.</p>
<p>The FBI disagreed. It told the GAO that its testing satisfied requirements for
providing investigative leads and that the Bureau lacked authority to set accuracy
requirements for external systems.</p>
<p>Three of the six GAO recommendations dealt with accuracy—a massive red flag for
a system that flags and investigates people based on algorithmic photo matches
selected from millions of candidates.</p>
<p>Two more dealt with transparency: the FBI had failed to publish required Privacy
Impact Assessments<sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup> and a System of Records Notice<sup class="footnote-ref"><a href="#footnote6">[6]</a><a class="footnote-anchor" id="footnote-ref6"></a></sup> — legally
mandated disclosures for a program handling tens of millions of Americans’
photos. DOJ eventually published the missing documents, though years late.</p>
<p>By 2019, <a href="https://www.gao.gov/products/gao-19-579t">only one of the six recommendations had been fully
implemented</a>. The FBI had begun conducting user audits but still
had not tested accuracy for smaller candidate lists, had not assessed external
partner systems, and had not conducted the recommended annual operational
reviews. The GAO maintained all five remaining recommendations were valid.</p>
<p>Iowa, for its part, did no better. In response to public records requests:</p>
<ul>
<li>The Iowa DOT and DPS each confirmed that the FBI never shared results of any
accuracy tests.</li>
<li>The Iowa DOT, despite having a “facial recognition analyst” on staff, never
performed its own accuracy testing.</li>
<li>Neither the DOT nor DPS ever solicited or received reports about the system’s
accuracy from the vendor. Their only information comes from general materials
provided, or published online, by the vendor.</li>
<li>DPS “[had] not yet adopted a final policy” governing its use of facial
recognition, on the grounds that it was waiting to determine “what uses may be
accurate or inaccurate, reliable or unreliable, appropriate or
inappropriate.”<sup class="footnote-ref"><a href="#footnote7">[7]</a><a class="footnote-anchor" id="footnote-ref7"></a></sup> That was in 2016. A decade later, it still hasn’t
looked at system accuracy—knowledge it claims is a prerequisite to regulation.</li>
</ul>
<p>The FBI did not respond to a FOIA request (other than with the stack of MoUs
from other states that were not part of the request).</p>
<p>As the ACLU of Minnesota <a href="https://www.aclu-mn.org/news/biased-technology-automated-discrimination-facial-recognition/">summarizes</a>: “Facial recognition automates
discrimination.” The agencies either believe their algorithm is infallible, or
they don’t care whether it’s accurate as long as it gets them an occasional
result. Substantial academic and technical literature on algorithmic bias goes
ignored, as does the federal government’s own accountability office.</p>
<h2>The Bigger Picture: National Mass Surveillance</h2>
<p>Iowa’s nightly scan is one node in a much larger system — one that has been
expanding steadily and is now accelerating.</p>
<p>The infrastructure began with REAL ID and the MoUs that gave the FBI access to
state driver’s license databases. In December 2025, Iowa was <a href="https://www.ktiv.com/2025/12/02/iowa-among-states-that-will-help-homeland-security-obtain-drivers-license-records/">one of four
states</a> that agreed to help the Trump administration gain access to
state driver’s license data through NLETS.<sup class="footnote-ref"><a href="#footnote8">[8]</a><a class="footnote-anchor" id="footnote-ref8"></a></sup></p>
<p>The deal was <a href="https://sos.iowa.gov/news-resources/iowa-secretary-state-statement-federal-lawsuit-settlement">part of a settlement</a> that allowed Iowa to upload its
voter rolls to the federal government for citizenship verification through
SAVE,<sup class="footnote-ref"><a href="#footnote9">[9]</a><a class="footnote-anchor" id="footnote-ref9"></a></sup> after the Secretary of State had flagged over two thousand
potential non-citizen voters by cross-referencing voter rolls with DOT records —
driver’s license application data that was, in many cases, years out of date.</p>
<p>Subsequent federal verification through SAVE confirmed only 277, roughly 12% of
those flagged based on the DOT’s REAL ID records.</p>
<p>Meanwhile, DHS has also declared that REAL ID—the system it spent twenty years
building these invasive, networked fraud-prevention and citizenship-verification
systems for—<a href="https://storage.courtlistener.com/recap/gov.uscourts.alsd.76579/gov.uscourts.alsd.76579.44.1.pdf">is not fit for purpose</a>.</p>
<p>In a December 2025 court filing, a DHS official stated that “REAL ID can be
unreliable to confirm U.S. citizenship” in response to a lawsuit by an
American citizen who was <a href="https://reason.com/2025/12/31/dhs-says-real-id-which-dhs-certifies-is-too-unreliable-to-confirm-u-s-citizenship/">detained twice during immigration raids</a>
despite presenting his valid REAL ID.</p>
<p>What immigration enforcement now demands is being filled by facial recognition.
ICE agents carry <a href="https://www.404media.co/you-cant-refuse-to-be-scanned-by-ices-facial-recognition-app-dhs-document-says/">Mobile Fortify</a>, a smartphone app that reportedly
scans faces against over 200 million images across DHS, FBI, and State
Department databases.</p>
<p>DHS does not let subjects decline to be scanned, and photos — including those of
U.S. citizens — are stored for fifteen years. CBP has gone further, releasing
<a href="https://www.404media.co/cbp-quietly-launches-face-scanning-app-for-local-cops-to-do-immigration-enforcement/">Mobile Identify</a>, a separate facial recognition app available to
state and local police agencies deputized for immigration enforcement through
287(g) agreements.</p>
<p>The federal government and state DMVs spent twenty years laying the groundwork
for all of this while Presidents, Governors, and members of Congress rotated in
and out of service. The MoUs. The nightly scans.  The databases quietly compiled
from photos taken to get permission to drive — or, for non-operator ID holders,
simply to prove who they are.</p>
<p>Iowa’s program is not an outlier. It is the foundation. It is twenty years of
federally funded research, data collection, and algorithmic lineups that, by
the government’s own accounting, is unreliable and serves no significant public
purpose.</p>
<hr>
<p>Iowa’s DOT does not limit itself to <a href="https://footnote4a.org/news/dot-permits">approving questionable
permits</a> for police surveillance cameras and <a href="https://footnote4a.org/news/dot-permits-pt2">waiving
roadside safety standards</a> to accommodate them. Through
its Motor Vehicle Division, it also operates one of the most invasive automated
surveillance programs in the state.</p>
<p>For 3.5 criminal charges per year — overwhelmingly misdemeanors, with no
recorded convictions — and 28 investigations that led nowhere at all, every new
driver’s license photo in Iowa enters the nightly automated lineup, and, along
with it, the database that federal, state, and local police across the country
can access on demand.</p>
<p>Whether you’re an immigrant or have never left Ottumwa, if IDEMIA’s computer
says you’re a suspect, the government will find out everything there is to know
about you—to start with.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>The DOT delivered outcome data on February 10, 2026, over a month past
its self-imposed early January deadline. The data covered January 2022 through
November 2025. The full spreadsheet is linked above. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Georgetown’s <em>The Perpetual Lineup</em> reported 13 million driver’s license photos
in the system as of 2016. A 2013 <em>Gazette</em> <a href="https://www.thegazette.com/2013/07/03/iowa-dot-using-facial-recognition-technology/">report</a>
put the figure at 12 million photos representing approximately 2.1 million
individuals — the discrepancy with Iowa’s population of roughly 3.2 million
reflects the accumulation of historical photos, including expired licenses and
prior images retained in the database. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>The FOIA request specifically sought Iowa-related records. The FBI’s
production of MoUs from other states — while non-responsive to the request —
inadvertently confirmed the breadth of the program. The responsive
Iowa-specific records were not produced. The FBI did not provide additional
context for these records. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>Case C27411 bears a 2025 date but its case number suggests it originated in 2022. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>Privacy Impact Assessment, a systematic assessment of a project that identifies
potential privacy impacts and recommends ways to manage, minimize, or eliminate them. <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote6" class="footnote-item"><p>System of Records Notice, a document required by the Privacy Act of 1974 that informs
the public about federal agency systems of records containing personally identifiable
information. <a href="#footnote-ref6" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote7" class="footnote-item"><p>Georgetown Law Center on Privacy &amp; Technology, <em>The Perpetual Lineup</em> (2016). <a href="#footnote-ref7" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote8" class="footnote-item"><p>The National Law Enforcement Telecommunications System; a nationwide
computer network that allows law enforcement agencies to search records
across state lines. <a href="#footnote-ref8" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote9" class="footnote-item"><p>Systematic Alien Verification for Entitlements. A federal immigration
status database created in 1986. <a href="#footnote-ref9" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[The Deal has been Altered Further: Flock Publishes New Terms]]></title>
            <link>https://footnote4a.org/news/terms-feb2026</link>
            <guid isPermaLink="false">https://footnote4a.org/news/terms-feb2026</guid>
            <pubDate>Mon, 16 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Flock's terms got worse. All of them. The new terms add perpetual data licenses, mandatory Georgia arbitration, and potential constitutional problems for every city that signs.]]></description>
            <content:encoded><![CDATA[<p>In December, <a href="https://footnote4a.org/news/trojan-contracts">we documented how Flock Safety rewrote</a> its <a href="https://footnote4a.org/blog/trojan-contracts/dec-2025-terms.pdf">Terms &amp;
Conditions</a> to strip data ownership from customers, expand its intellectual property claims
to cover virtually everything its system touches, and move the entire contract onto a
vendor-controlled website where it can be changed at will.</p>
<div class="markdown-alert markdown-alert-note">
<p class="markdown-alert-title">Note</p>
<p><strong>February 17, 2026 update</strong></p>
<p>Flock addressed the points below in a blog post, “<a href="https://archive.is/lstMg">Flock Provides Terms &amp; Conditions Update to
Make Definitions Simpler and Provide Customer Clarity</a>.”</p>
<p>I have added <a href="#reply">a new section below</a> to explain how that blog does not meaningfully
contradict anything here.</p>
</div>
<p>On <a href="https://footnote4a.org/blog/terms-feb2026/feb-2026-terms.pdf">February 16, 2026, Flock updated those terms</a> again. The new version cleans up the
structural contradictions in the December terms and locks in a set of provisions that are, in nearly
every respect, worse for customers. It includes mandatory arbitration, moves disputes into the state
of Georgia, and strips language that could hinder data sales.</p>
<p>The <a href="https://footnote4a.org/blog/terms-feb2026/comparison-dec-feb.pdf">comparison report</a> shows 147 changes across 96 replacements, 21 insertions, and 30
deletions. The document grew from 12 to 15 pages.</p>
<p>@<a href="https://footnote4a.org/blog/trojan-contracts/dec-2025-terms.pdf" class="collapsible">Flock December 2025 Terms</a>
@<a href="https://footnote4a.org/blog/terms-feb2026/feb-2026-terms.pdf" class="collapsible">Flock February 2026 Terms</a>
@<a href="https://footnote4a.org/blog/terms-feb2026/comparison-dec-feb.pdf" class="collapsible">Comparison report</a></p>
<h2>Data Ownership: The Elegant Swindle</h2>
<p>The December terms pulled an awkward trick. They defined “Footage” separately,<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> excluded it from
“Customer Data,” and then told customers they owned “Customer Data” — just not the actual images,
video, and audio “their” cameras captured. It was clumsy, and it was obvious.</p>
<p>The February terms fix the clumsiness, but leave the harm.</p>
<p>“Footage” is no longer a defined term. It’s gone. “Customer Data” is redefined to include:</p>
<blockquote>
<p>all (a) data and information captured by Flock Hardware on behalf of Customer through the Flock
Services (e.g., images, audio, and/or video) and the metadata associated therewith<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
</blockquote>
<p>On paper, this looks like a win — footage is back inside Customer Data! Customers own their data
again!</p>
<p>Not quite. Two things happened simultaneously.</p>
<p>First, the December commitment that “Flock does not own and shall not sell Customer Data” was
deleted. That sentence no longer appears anywhere in the contract.</p>
<p>Second, the data license was expanded. December granted Flock:</p>
<blockquote>
<p>a limited, non-exclusive, royalty-free, irrevocable, worldwide license to use the Customer Data
and perform all acts as may be necessary for Flock to <strong>provide the Flock Services to
Customer</strong><sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup></p>
</blockquote>
<p>February grants Flock:</p>
<blockquote>
<p>a limited, non-exclusive, royalty-free, irrevocable, <strong>perpetual</strong>, worldwide license to (a) use
and disclose Customer Data to provide the Flock Services; and (b) <strong>use Customer Data to support
and improve Flock’s products and services</strong><sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup></p>
</blockquote>
<p>That’s two critical additions. The license is now <em>perpetual</em> — it doesn’t expire when the contract
ends. And clause (b) allows Flock to use all Customer Data, including the footage it just folded
back in, for its own product development. No restrictions. No limitations.</p>
<p>In December, customers owned the metadata but not the footage. In February, customers “own”
everything — but Flock has a perpetual, irrevocable license to use all of it for anything it wants,
forever.</p>
<p>The customer owns the house. Flock has a permanent, rent-free key.</p>
<h2>Training Data Guardrails: Deleted</h2>
<p>The December terms, for all their problems, included a detailed Training Data section<sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup> with
ostensible privacy commitments: images “stripped of all metadata and identifying information,” used
“solely for the limited purpose of improving the Flock Services through machine learning,” “never
sold or shared with third parties,” and “maintained separately and never combined in a manner that
would render it personally identifiable.”</p>
<p>February deletes all of it. Section 4.3 is gone. In its place: clause (b) of the new data license —
“use Customer Data to support and improve Flock’s products and services.”</p>
<p>Every guardrail the December terms promised for machine learning training has been removed:</p>
<ul>
<li><strong>De-identification?</strong> Not required.</li>
<li><strong>Separate maintenance?</strong> Not required.</li>
<li><strong>Limited to “a small fraction of images”?</strong> No — the license covers all Customer Data.</li>
<li><strong>“Never sold or shared with third parties”?</strong> That commitment no longer exists.</li>
</ul>
<p>The scope of data available for product development expanded from “a small fraction of images”
stripped of identifying information, to the entire corpus of Customer Data — including footage,
metadata, license plate numbers, timestamps, and geospatial coordinates — with no privacy
restrictions whatsoever.</p>
<h2>Governing Law: Georgia on Everyone’s Mind</h2>
<p>This is the most significant net-new change the February terms introduce.</p>
<p>The December terms used the law of the state where the customer is located, with venue in that
state’s courts.<sup class="footnote-ref"><a href="#footnote6">[6]</a><a class="footnote-anchor" id="footnote-ref6"></a></sup> This was a standard and customer-favorable provision, particularly for
government agencies that may have statutory rights to litigate in their home jurisdictions.</p>
<p>February replaces this with:</p>
<blockquote>
<p>The Agreement … shall be governed exclusively by, and construed and enforced in accordance with,
the laws of the State of Georgia, without regard to its conflicts of laws principles.<sup class="footnote-ref"><a href="#footnote7">[7]</a><a class="footnote-anchor" id="footnote-ref7"></a></sup></p>
</blockquote>
<p>And it doesn’t stop at choice of law. The December terms contemplated normal court litigation.
February imposes mandatory mediation followed by binding arbitration through the American
Arbitration Association:</p>
<blockquote>
<p>If any Dispute cannot be settled through direct discussions, the Parties agree to endeavor first
to settle such Dispute by mediation administered by the American Arbitration Association under its
Commercial Mediation Procedures before resorting to arbitration. The Parties further agree that
any Dispute that remains unresolved by mediation shall be settled by arbitration.<sup class="footnote-ref"><a href="#footnote7">[7:1]</a><a class="footnote-anchor" id="footnote-ref7:1"></a></sup></p>
</blockquote>
<p>For a government agency in Iowa, or California, or any state that isn’t Georgia, this means: if
Flock breaches the contract, you don’t get to sue in your own courts under your own laws. You
mediate, then arbitrate, under Georgia law, through the AAA.</p>
<p>Many state and local governments have statutes requiring government contracts to be governed by
local law and adjudicated in local courts. Whether a mandatory arbitration clause in click-through
terms can override those requirements is an open question — but one that a city’s attorney should be
answering <em>before</em> the Order Form hits the consent agenda, not after.</p>
<h3>Iowa’s Arbitration Statute: A Potential Defense</h3>
<p>Although this will vary from state to state, for Iowa municipalities in particular, the mandatory
arbitration clause may not survive contact with Iowa Code §679A.1(2). That statute provides that
arbitration clauses for future controversies do not apply to “take it or leave it” contracts of
adhesion.<sup class="footnote-ref"><a href="#footnote8">[8]</a><a class="footnote-anchor" id="footnote-ref8"></a></sup></p>
<p>Given the mechanism we’ve documented — Flock posts terms on its website, changes them at will,
blocks Wayback Machine archiving, and requires cities to accept them via Order Form signature with
no negotiation — there is a strong argument these qualify.</p>
<p>Iowa law also excludes tort claims from mandatory arbitration unless there is a separate writing
executed by all parties specifically agreeing to arbitrate torts.<sup class="footnote-ref"><a href="#footnote9">[9]</a><a class="footnote-anchor" id="footnote-ref9"></a></sup> Flock’s T&amp;C is a single
document — there is no separate tort arbitration agreement.</p>
<p>So if a city has a negligence claim against Flock — say, a data breach caused by failure to maintain
reasonable security — the arbitration clause may not reach it under Iowa law regardless of whether
the contract is adhesive.<sup class="footnote-ref"><a href="#footnote10">[10]</a><a class="footnote-anchor" id="footnote-ref10"></a></sup></p>
<p>Unfortunately, the taxpayer would be on the hook for the litigation—which could exceed the cost of
the contract—either way.</p>
<h2>Liability: The Gross Negligence Loophole Closes</h2>
<p>The December terms capped Flock’s liability at 12 months of fees — standard SaaS boilerplate. But
they included a critical exception:</p>
<blockquote>
<p>NOTWITHSTANDING ANYTHING TO THE CONTRARY, THE FOREGOING LIMITATIONS OF LIABILITY SHALL NOT APPLY
(I) IN THE EVENT OF GROSS NEGLIGENCE OR WILLFUL MISCONDUCT, OR (II) INDEMNIFICATION
OBLIGATIONS.<sup class="footnote-ref"><a href="#footnote11">[11]</a><a class="footnote-anchor" id="footnote-ref11"></a></sup></p>
</blockquote>
<p>February deletes this exception entirely.</p>
<p>Under the new terms, Flock’s liability is capped at 12 months of fees even if Flock acts with gross
negligence or willful misconduct. If Flock deliberately or recklessly causes harm — say, through a
data breach caused by knowing failure to maintain reasonable security — the customer’s maximum
recovery is whatever it paid in the prior year.</p>
<p>The indemnification provisions are gone too. December’s §9.3 required Flock to indemnify customers
for IP infringement claims and installation damage. February eliminates all indemnification language
— Flock’s and the customer’s.</p>
<p>The removal of customer indemnity (which I <a href="https://footnote4a.org/news/trojan-contracts">flagged in December</a> as a new
and concerning addition) is technically customer-favorable in isolation.</p>
<p>The overall trade — dropping indemnification entirely while also removing the gross negligence
exception — leaves customers in a strictly worse position.</p>
<h2>Non-Appropriation: From Exit Ramp to Dead End</h2>
<p>The December terms allowed government customers to terminate for non-appropriation with 30 days’
written notice “without penalty or other cost.”<sup class="footnote-ref"><a href="#footnote12">[12]</a><a class="footnote-anchor" id="footnote-ref12"></a></sup></p>
<p>February adds two restrictions:</p>
<blockquote>
<p>Customer shall remain responsible for all amounts incurred prior to termination, and
non-appropriation shall not be based on discretionary budget decisions or operate as a termination
for convenience right.<sup class="footnote-ref"><a href="#footnote13">[13]</a><a class="footnote-anchor" id="footnote-ref13"></a></sup></p>
</blockquote>
<p>The “discretionary budget decisions” language is the operative weapon here. When a city council
decides not to fund a surveillance program, is that a “discretionary budget decision”?</p>
<p>Almost by definition, yes.</p>
<p>This provision appears designed to prevent government customers from using non-appropriation as an
exit ramp when they simply decide they no longer want the service — which is, of course, the entire
point of non-appropriation clauses.</p>
<h3>The Constitutional Problem</h3>
<p>In Iowa (and many other states), the non-appropriation clause isn’t a negotiating courtesy but the
mechanism that keeps multi-year vendor contracts from being classified as “debt” under
constitutional limits.</p>
<p>Debt levels for local governments can be capped.<sup class="footnote-ref"><a href="#footnote14">[14]</a><a class="footnote-anchor" id="footnote-ref14"></a></sup> The standard way to keep a multi-year contract
outside that cap is the non-appropriation clause: because the government can walk away if funds
aren’t appropriated, the contract is a “current expense” rather than an enforceable multi-year debt
obligation.</p>
<p>Iowa’s Department of Administrative Services procurement manual states that service contracts
crossing fiscal year lines “should include a non-appropriation provision.”<sup class="footnote-ref"><a href="#footnote15">[15]</a><a class="footnote-anchor" id="footnote-ref15"></a></sup> The Iowa League of
Cities’ model debt policy is even more direct: certain agreements “must contain ‘annual
appropriation’ provisions so that the agreement does not count against the city’s constitutional
debt limit.”<sup class="footnote-ref"><a href="#footnote16">[16]</a><a class="footnote-anchor" id="footnote-ref16"></a></sup></p>
<p>If Flock’s restrictive language effectively nullifies the non-appropriation clause — by preventing
cities from exercising it whenever the non-appropriation results from a “discretionary budget
decision” — then the contract arguably creates an enforceable multi-year financial obligation.</p>
<p>That’s debt.</p>
<p>And if it’s debt, it may count against the constitutional cap, or worse, may require voter approval
that was never obtained.</p>
<p>A Flock contract is unlikely to push a city over its debt limit on its own. But the principle
matters: if a vendor can contractually prohibit a municipality from exercising its non-appropriation
right, the constitutional protection is meaningless. Every vendor can do it. The debt limit becomes
advisory.</p>
<p>Cities should ask their attorneys a simple question before signing: does this non-appropriation
clause actually let us non-appropriate?</p>
<h2>What Got Better</h2>
<p>In the interest of completeness: a few changes are at least facially customer-favorable.</p>
<p><strong>IP non-infringement warranty.</strong> February adds a new warranty that Flock’s services don’t infringe
valid U.S. patents or registered copyrights.<sup class="footnote-ref"><a href="#footnote17">[17]</a><a class="footnote-anchor" id="footnote-ref17"></a></sup> This is a real addition, though the carve-outs for
customer combinations and customer breaches are standard.</p>
<p><strong>Insurance specifics.</strong> December referenced a vague “Exhibit B” for insurance. February adds a
detailed Exhibit A specifying $1M/$2M commercial general liability, $1M auto, $5M professional
liability/E&amp;O, and $5M cyber liability.<sup class="footnote-ref"><a href="#footnote18">[18]</a><a class="footnote-anchor" id="footnote-ref18"></a></sup> Actual numbers are better than vague promises.</p>
<p><strong>Retention Period coverage.</strong> December’s Retention Period applied to “Customer Data” (which
excluded Footage), creating the implicit permission for indefinite footage retention that we
identified in our previous analysis. February redefines the Retention Period to cover “footage
captured by the Flock Hardware or Customer Hardware via the Flock Services and the associated
metadata.”<sup class="footnote-ref"><a href="#footnote19">[19]</a><a class="footnote-anchor" id="footnote-ref19"></a></sup> This theoretically closes that gap — though the period itself is still “as specified
in the applicable Order Form,” which means Flock and the customer still negotiate it (or don’t)
separately.</p>
<h2>The Pattern</h2>
<p>The December revision was the hostile restructuring. February is the cleanup.</p>
<p>December moved contract terms online, carved footage out of customer data, and expanded Flock’s IP
claims. But it left contradictions and rough edges — the Training Data section still promised
privacy guardrails that the rest of the contract was busy undermining; the governing law provision
still favored customers; the liability cap still had exceptions for truly bad behavior.</p>
<p>February resolves those contradictions. Every resolution favors Flock.</p>
<p>The terms are now internally consistent: Flock has a perpetual, irrevocable license to all customer
data for any purpose; disputes go to Georgia-law arbitration; liability is hard-capped regardless of
fault; and the non-appropriation exit for government customers has been narrowed to the point where
it may not function as intended — raising questions about whether these contracts create
unconstitutional debt obligations for the municipalities that sign them.</p>
<p>Flock’s marketing materials, as of this writing, continue to claim that “Customers own 100% of the
data collected.” The February contract no longer directly contradicts that claim but it does make it
an elegant lie.</p>
<hr>
<p><a name="reply"></a></p>
<h2>Flock Loblaw’s Law Blog</h2>
<p>This section was added February 17, 2026. The points below address Flock’s <a href="https://archive.is/lstMg">blog post</a>.</p>
<h3>A Simpler, Clearer Definition of “Customer Data”</h3>
<p><a href="https://archive.is/lstMg#selection-1587.0-1658.0">(Section text)</a></p>
<p>Agreed. It’s simple, it’s clear: there’s one big bucket of Customer Data and Flock gets a license to
do whatever it wants with it.</p>
<h3>Flock Does Not Own or Sell Customer Data</h3>
<p><a href="https://archive.is/lstMg#selection-1659.0-1709.233">(Section text)</a></p>
<p>James Cameron owns the movie Titanic, but Walt Disney and Paramount can still charge me to see
it. Cameron licensed the movie to them—to “support and improve their services.”</p>
<p>Ownership is irrelevant when the license grants control.</p>
<h3>Clarifying the “Perpetual” License</h3>
<p><a href="https://archive.is/lstMg#selection-1717.0-1750.0">(Section text)</a></p>
<p>First, “[t]his is a standard software industry provision” should hold no weight here. According to
Flock (when it suits), we are dealing with sensitive criminal justice information and information
that can jeopardize officer safety. Let’s not base protections on Silicon Valley trends.</p>
<blockquote>
<p>The right to use data to support and improve those services must extend beyond the duration of a
single customer’s contract.</p>
</blockquote>
<p>Why? Why does Customer Data need to be used beyond the duration of the contract to “support and
improve products and services”? It would be one thing to hang on to, say, user-submitted feedback,
but that category was deleted in favor of the simplified “Customer Data” that includes the footage.</p>
<p>Removing that distinction is a choice.</p>
<h3>Updates Around Disclosure Provisions</h3>
<p><a href="https://archive.is/lstMg#selection-1751.0-1778.0">(Section text)</a></p>
<p>Similar to the “Customer Data” simplification, this deletes specific disclosure rules for each
category of data in favor of a single simple and clear rule: “we can disclose what we want when we
want to whomever we want.”</p>
<h3>Governing Law</h3>
<p><a href="https://archive.is/lstMg#selection-1779.0-1800.0">(Section text)</a></p>
<blockquote>
<p>The updated Terms specify Georgia law as the governing law for the agreement, which is standard
commercial practice</p>
</blockquote>
<p>Standard practice or not, up until two days ago Flock “agree[d] that venue would be proper in the
chosen courts of the State of which the Customer is located.”</p>
<p>Flock then quickly fast-forwards on the part where binding arbitration is now mandatory and Georgia
law governs. This removes the contract from the state that its local government customers operate
under.</p>
<p>Whether the actual arbitration ultimately happens at a Ramada in Des Moines or in a boardroom in
Atlanta is irrelevant: the point is that anyone with a contract dispute must now hire a Georgia
lawyer to play an Away game.</p>
<h3>Standard Terms, Collaborative Approach</h3>
<p><a href="https://archive.is/lstMg#selection-1801.1-1815.121">(Section text)</a></p>
<p>Finally, Flock claims it’s happy to negotiate while it continues to make its customers sign order
forms that reference the terms on its website—where it can (and just did) update them at any time.</p>
<hr>
<p class="text-sm"><em>Updated February 18, 2026</em>: Added “Section text” links. Added some clarifying statements.</p>
<p class="text-sm"><em>I am not an attorney. This analysis reflects my interpretation of contract language and is subject
to change. Cities should consult qualified attorneys regarding their specific agreements.</em></p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>December 2025 T&amp;C, §1.11: “‘Footage’ means still images, video, audio, and other raw data
captured by the Flock Hardware or Customer Hardware via the Flock Services.” <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>February 2026 T&amp;C, §1.6. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>December 2025 T&amp;C, §4.1. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>February 2026 T&amp;C, §4.1. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>December 2025 T&amp;C, §4.3. <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote6" class="footnote-item"><p>December 2025 T&amp;C, §11.6. <a href="#footnote-ref6" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote7" class="footnote-item"><p>February 2026 T&amp;C, §11.5. <a href="#footnote-ref7" class="footnote-backref">↩︎</a> <a href="#footnote-ref7:1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote8" class="footnote-item"><p>Iowa Code §679A.1(2)(a). The statute provides that mandatory arbitration clauses for future
controversies “shall not apply to … [a] contract of adhesion.” <a href="#footnote-ref8" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote9" class="footnote-item"><p>Iowa Code §679A.1(2)©: arbitration clauses do not apply to “any claim sounding in tort whether
or not involving a breach of contract” unless “otherwise provided in a separate writing executed
by all parties to the contract.” <a href="#footnote-ref9" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote10" class="footnote-item"><p>The Iowa Supreme Court confirmed this framework when the court ordered contract claims to
arbitration but denied arbitration of the tort claim because §679A.1(2)© excludes torts absent
a separate writing. <em>See</em> <em>Wesley Retirement Services v. Hansen Lind Meyer</em>, 594 N.W.2d 22, 26
(Iowa 1999) <a href="#footnote-ref10" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote11" class="footnote-item"><p>December 2025 T&amp;C, §9.1. <a href="#footnote-ref11" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote12" class="footnote-item"><p>December 2025 T&amp;C, §11.15. <a href="#footnote-ref12" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote13" class="footnote-item"><p>February 2026 T&amp;C, §11.12. <a href="#footnote-ref13" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote14" class="footnote-item"><p>Iowa Constitution, Article XI, §3: “No county, or other political corporation or subdivision of
the State, shall be allowed to become indebted in any manner, or for any purpose, to an amount,
in the aggregate, exceeding five per centum on the value of the taxable property within such
county or subdivision.” <a href="#footnote-ref14" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote15" class="footnote-item"><p>Iowa Department of Administrative Services, Procurement Manual, Chapter 7: “Service contracts
may cross biennial and fiscal year lines, and, when they do, the contract should include a
non-appropriation provision.” <a href="#footnote-ref15" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote16" class="footnote-item"><p>Iowa League of Cities, Debt Policy Model: TIF development agreements “must contain ‘annual
appropriation’ provisions so that the agreement does not count against the city’s constitutional
debt limit.” <a href="#footnote-ref16" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote17" class="footnote-item"><p>February 2026 T&amp;C, §8.2(a). <a href="#footnote-ref17" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote18" class="footnote-item"><p>February 2026 T&amp;C, Exhibit A. <a href="#footnote-ref18" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote19" class="footnote-item"><p>February 2026 T&amp;C, §1.19. <a href="#footnote-ref19" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>contract-procurement</category>
        </item>
        <item>
            <title><![CDATA[Langley Speaks on the Burden of Truth and Minority Report]]></title>
            <link>https://footnote4a.org/news/burden-of-truth</link>
            <guid isPermaLink="false">https://footnote4a.org/news/burden-of-truth</guid>
            <pubDate>Mon, 09 Feb 2026 13:00:00 GMT</pubDate>
            <description><![CDATA[Flock CEO Garrett Langley praises Minority Report's precrime program, conflates arrest with conviction, and deploys an evidence authentication system that wouldn't survive a first-year cross-examination.]]></description>
            <content:encoded><![CDATA[<p>In January, Flock CEO Garrett Langley did an interview with Inspired Capital, a venture capital
firm. In it, he discusses his takes on crime, the judicial system, and offers some revealing praise
for the approach taken for the “precrime” police program in the 2002 movie, <em>Minority Report</em>.</p>
<h2>Precrime as a Business Model</h2>
<p>In the broader context of AI doing investigative police work—something Flock is pushing hard with
Nova and its “Night Shift” feature—Langley had this to say when asked about <em>Minority Report</em>:</p>
<blockquote>
<p>[When] you think about it, it was decades of arrests with only one wrongful arrest. How nice would
that be if our current judicial system and policing system only had one wrongful arrest and
multiple deaths? That sounds great.</p>
</blockquote>
<p>The only problem with this system, according to Langley, is that the “terminal decision” lies with
the “precog”<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> rather than a human—the old “local decision” mantra Flock repeats in public,
but puts aside when it <a href="https://footnote4a.org/news/secret-searches-part2">unilaterally removes “permanent” information</a>
from its product.</p>
<p>Langley either completely misses the point of the movie, or he aims to bring about its dystopia in
his stated, quixotic quest to eliminate crime.</p>
<p><em>Minority Report</em>’s problem was never that the precogs were, like AI, “inhuman,” as Langley puts it.
The movie is a warning that putting blind faith into a system—<em>any system</em>—is a terrible mistake.</p>
<p>The term “Minority Report” in the movie’s universe refers to an outlying data point: a piece of
evidence that contradicts the other evidence and, at minimum, raises doubt about the system’s
fallibility. The government’s solution in the movie? Purge minority reports from the record and hide
their existence from the public.</p>
<p>The “one wrongful arrest”—which was actually a conviction—serves to highlight that the system has
always been fallible. There are likely thousands of innocents who could not have been convicted but
for the purged minority reports, removed from society “to eliminate crime in America.”</p>
<p>It’s a fitting reference for a company whose approach to inconvenient data is to make it disappear.</p>
<h2>Blurring the Line Between Arrest and Conviction</h2>
<p>In the same interview, Langley speaks on <a href="https://www.youtube.com/watch?v=K8ZFl4FndFs&amp;t=749s">real-world problems in proving crime</a>. The first,
he claims, is that people will no longer come forward as witnesses.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> He continues:</p>
<blockquote>
<p>The second is: our expectations of truth have gone through the roof. And and this is, like,
largely a good thing, but you know, people like you and me watch NCIS on TV and we assume there’s
cameras everywhere. … and you watch [shows like NCIS] and you’re like, “Oh, like this is how [it
works]”, but the real world doesn’t work this way.</p>
<p>And so you you get to a judge, you get to a jury, and absent incredibly hard evidence, an arrest
will not occur. And that’s actually, I think, good. We’re holding ourselves to a higher standard
of eliminating wrongful arrest, but that kind of moves the difficulty level up. And then those
two things are compounded by [the third issue of] a staffing crisis, right?</p>
</blockquote>
<p>There’s a tell buried in this quote: Langley keeps saying “arrest” when he means “conviction.” He
did it with Minority Report, and he does it again here. Judges and juries don’t decide arrests—they
decide convictions. The standard for arrest is <em>probable cause</em>, which is far lower than the
courtroom standard of <em>beyond a reasonable doubt</em>.</p>
<p>This conflation is not accidental. It’s strategic. Flock’s product is strong enough to generate
arrests—point a camera at a road, flag a plate, send a cop. But generating a <em>conviction</em> requires
evidence that can survive cross-examination, expert challenge, and judicial scrutiny. As we’ll see
below, Flock’s evidence authentication doesn’t clear that bar. Langley blurs the terms because
admitting the distinction would expose the gap between what Flock can trigger and what Flock can
prove.</p>
<h3>The CSI Effect and the “Burden of Truth”</h3>
<p>Langley is gesturing at something real: the so-called “CSI Effect,” where jurors exposed to
forensic-heavy TV dramas expect more scientific evidence than prosecutors can realistically provide.
It’s a documented phenomenon, and it has made some prosecutions harder.</p>
<p>But Langley doesn’t frame it that way. Instead, he frames rising evidentiary expectations as a
problem to be solved—a “difficulty level” that Flock can help overcome. The implication is that
courts should lower the bar, or that Flock’s evidence should clear it. Neither follows. The standard
in criminal proceedings exists to protect defendants from wrongful conviction. That standard hasn’t
“gone through the roof.” It’s exactly where it’s supposed to be.</p>
<p>What <em>has</em> changed is that Flock wants to be the one supplying the evidence—and the evidence it
produces, as we’ll see, doesn’t hold up.</p>
<h2>Why Flock’s Evidence Doesn’t Hold Up</h2>
<p>First, a caveat: I don’t claim authority on the Rules of Evidence. It’s a complex topic. If any
lawyers want to correct me on anything, please <a href="mailto:humans@haveibeenflocked.com">reach out</a>.</p>
<p>Here’s the gist: you can’t just make shit up and throw it at the judge. Courts require any evidence
to have a basis and to be introduced by someone. This is, in part, why the prosecutor can’t show up
with bodycam footage of you rolling up to the Louvre with your ladder—a police officer who was
wearing the bodycam has to show up and say “I saw this guy carrying a ladder through the streets of
Paris.”</p>
<p>When it comes to Flock footage, that means either (1) a witness comes in and says “I saw this,”
(2) an expert comes in and says “this is authentic and has not been tampered with,” or (3) the court
relies on more circumstantial evidence like metadata and affidavits.</p>
<p>Option 1 is impossible—there is no witness. Option 2 is expensive and exposes technical details in
open court. Which leaves option 3: the weakest possible basis and, apparently, the focus of
Langley’s complaint about standards going “through the roof.”</p>
<h3>How Flock Authenticates Evidence</h3>
<p>The details are sketchy, because of Flock’s continued lack of transparency, but I believe that some
time last year, Flock changed how it authenticates evidence. Where it used to sign an affidavit on
request, it now appears to use an automated process. Based on what I can determine, this is roughly
how it works since July 1, 2025:</p>
<ul>
<li>A Flock camera takes a picture</li>
<li>It creates a hash (shortened representation) of the image</li>
<li>Flock stores the image and the hash</li>
<li>An investigator goes into the Flock portal and downloads an image</li>
<li>(Optional) Flock deletes the image due to retention periods, but keeps the hash</li>
<li>The investigator, months later preparing for court, uploads the stored image to Flock</li>
<li>The server generates a hash of the uploaded image</li>
<li>The server compares it to the hash stored for the original capture</li>
<li>The server returns a PDF with the image and the date, time, and location of capture that
says “we checked: we took this picture and these items all belong together.”</li>
</ul>
<p>Sounds reasonable. It isn’t.</p>
<h3>The Chain of Custody Problem</h3>
<p>The Chain of Custody is a key part of the rules of evidence: you have to be able to show that
evidence has not been tampered with. For physical evidence, there are rigid protocols—sealing,
unsealing, signing in and out of secure storage.</p>
<p>For Flock’s images: nobody, most likely including Flock, knows who has had access to the image, the
metadata, or the hash at any point in the process. This is the reason CJIS requires permanent,
immutable audit logs.</p>
<p>Images captured by Flock cameras are stored unencrypted on the device before transmission. Flock has
previously said images are stored “for up to 7 days” on the camera, which means the metadata—capture
times, location data—is also stored for up to 7 days.</p>
<p>This asynchronous processing is a technical necessity when operating over spotty LTE networks, but
it also means there is a multi-day window in which images and metadata sit on an unattended,
unsecured device.</p>
<p>It’s the digital equivalent of finding a dead body in an alley and saying “we’ll come back in a few
days to collect the evidence.”</p>
<h3>The Metadata Integrity Problem</h3>
<p>There is no mechanism to validate that the metadata belongs to the image. A properly secured device
would have a TPM (Trusted Platform Module) that cryptographically binds the data, image, and hash
together so they cannot be separated, altered, or accessed independently. Flock’s cameras are not
such devices and, from the teardowns I’ve seen, contain no TPM.</p>
<p>By all appearances, the file hash and the metadata are simply stored in AWS alongside everything
else. Anyone with access to AWS—a Flock employee, a compromised account, a contractor—could update
the data. With a few keystrokes, a photo of your car taken in Langley, VA, could be associated with
a camera in Paris, IL.</p>
<p>Flock’s automated system will attest to this fact in court.</p>
<h3>What Flock’s System Actually Proves</h3>
<p>Flock’s authentication is a convoluted version of “trust me, bro.” Instead of verifying that a photo
was taken where it was taken, when it was taken, it attests <strong>only</strong> to the fact that an image
downloaded from Flock matches another image in Flock’s system.</p>
<p>That’s not authentication. That’s “both our watches say it’s 2:37pm, so it must be 2:37pm”—while
ignoring that you left them unattended in your hotel room for three days before driving from Chicago
to L.A. All it proves is that both watches show the same time.</p>
<p>Langley wants us—and the courts—to accept 2:37pm as the absolute, indisputable truth. The times
match, and he’s wearing one of the watches—how could it not be the truth?</p>
<p>The law demands more, and so should the courts when they are deciding someone’s life and liberty.</p>
<p>Staff shortage be damned.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>A “precognitive” individual in the movie’s universe who can see crimes before they happen. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>I have not verified whether his claim is true, but if people are no longer stepping
up, my first theory would be that it has to do with decreasing societal trust in police—perhaps
for the very reasons discussed in this post. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>foia-transparency</category>
        </item>
        <item>
            <title><![CDATA[The Many Faces of Flock Permits (Part II)]]></title>
            <link>https://footnote4a.org/news/dot-permits-pt2</link>
            <guid isPermaLink="false">https://footnote4a.org/news/dot-permits-pt2</guid>
            <pubDate>Fri, 06 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Iowa has highway safety standards. Kind of.]]></description>
            <content:encoded><![CDATA[<p>The Iowa DOT has a utility accommodation program. It has regulations governing
that program. It has forms with safety standards printed right on them. It even
has a process for verifying that permitted installations comply with those
standards. What it does not have is any apparent interest in using any of it.</p>
<p>Back in November, I wrote about <a href="https://footnote4a.org/news/dot-permits">the Iowa DOT’s lack of a consistent permitting
process</a>. Further research shows that the DOT also lacks a
verification process and an inspection process. The permits it does issue are
approved based on plans that violate the safety standards printed on the
application itself.</p>
<p>In the article <em><a href="https://www.jsheld.com/insights/articles/what-is-the-clear-zone-and-why-is-it-critical-to-roadway-safety">What Is the Clear Zone and Why Is It Critical to Roadway
Safety?</a></em>, John Carlton, a licensed Professional Engineer, discusses
“why the clear zone is important to the safety of roadway users and provide
examples of commonly experienced violations that have resulted in personal
injury litigation.”</p>
<p><img src="https://footnote4a.org/blog/dot-permits-pt2/table.png" alt="Table with clear zone distances included in DOT permit applications" class="collapsible"></p>
<p>This table is included on DOT’s standard utility accommodation form and shows the
clear zone distances (ADT = Average Daily Traffic). The numbers matter: they are
the minimum distance between a roadside obstacle and the travel lane that gives
a driver a reasonable chance of recovery in a run-off-road event.</p>
<h2>The Missing Permits</h2>
<p>As noted in the <a href="https://footnote4a.org/news/dot-permits">previous article</a>, the information in the
permit applications for roadside cameras is sketchy at best. In some cases,
they’re sketched-up screenshots of Google Maps by a Sheriff’s Deputy, and signed
off on by the Sheriff, with little to no helpful descriptive information.</p>
<p><img src="https://footnote4a.org/blog/dot-permits-pt2/plans.png" alt="Site plans approved by the DOT"></p>
<p>The plans above were submitted to, and approved by, the Iowa DOT.</p>
<p>The middle image shows the clearest violation: the minimum “acceptable clear
zone” area, listed on the very form the permit was submitted on, is 12 feet.
The plan shows “10–12 feet.” The DOT approved it anyway.</p>
<h2>The Missing Failsafes</h2>
<p>But at least there are failsafes. On paper. After construction, the DOT’s
regulations require an “as-built” plan to be submitted with a certified
engineer’s stamp. If a plan is not submitted, the DOT is authorized to perform
an inspection at the permittee’s expense. This would uncover any shoddy work by
unqualified site planners and straighten out any problems with approvals.</p>
<p><img src="https://footnote4a.org/blog/dot-permits-pt2/as-built.png" alt="An installed roadside camera"></p>
<p>It turns out that the DOT does not follow its own regulations. Instead, it has
replaced regulation with policy. In the words of my formal complaint:</p>
<blockquote>
<p>For equipment installed under the utility accommodation program, Iowa Admin.
Code 761—115.7(8) (2025) requires the utility owner “to submit to the
department an as-built plan in an electronic format in accordance with
department specifications.”</p>
<p>Iowa DOT writes that it maintains a policy that “[w]hen not submitted we
accept the permitted plans as the asbuilt plan if the permittee did not
contact us with a change.”</p>
<p>Iowa DOT confirms that for this installation “no as-builts were submitted,”
and explains that “we identify the permitted plans as the as-builts.”</p>
</blockquote>
<p>In other words: Iowa DOT does nothing, even when the camera is obviously
installed in a way that appears unsafe. If it <em>is</em> somehow compliant, there is
no information in any of the DOT’s records that would demonstrate that
compliance.</p>
<p>It approves permits proposing non-compliant installations for “utilities” that
are owned by private corporations and deliver no service to the public, based on
the say-so of police officers and sheriff’s deputies.</p>
<p>To make matters worse, Flock—the contractor listed on many of these permits—is
not even a licensed contractor in the State of Iowa.</p>
<h2>The DOT’s Response</h2>
<p>I brought these issues to the attention of Iowa DOT director Scott
Marler.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p class="collapsible">@<a href="https://footnote4a.org/blog/dot-permits-pt2/dot-letter.pdf">January 12, 2026, letter to the Iowa DOT</a>
@<a href="https://footnote4a.org/blog/dot-permits-pt2/A-22A-2024-016.pdf" class="collapsible">Exhibit A — 22A-2024-016</a>
@<a href="https://footnote4a.org/blog/dot-permits-pt2/B-33A-2024-014_33A-2024-014.pdf" class="collapsible">Exhibit B — 33A-2024-014</a>
@<a href="https://footnote4a.org/blog/dot-permits-pt2/C-Installation.pdf" class="collapsible">Exhibit C — Installation</a>
@<a href="https://footnote4a.org/blog/dot-permits-pt2/D-CarlislePD.pdf" class="collapsible">Exhibit D — Carlisle PD</a>
@<a href="https://footnote4a.org/blog/dot-permits-pt2/E-Checklist.pdf" class="collapsible">Exhibit E — Checklist</a>
@[Exhibit F — Altoona PD TCD Application](/blog/dot-permits-pt2/F-Altoona PD TCD Application Signed_08302022.pdf){.collapsible}
@<a href="https://footnote4a.org/blog/dot-permits-pt2/G-Flock.pdf" class="collapsible">Exhibit G — Flock</a>
@[Exhibit H — DOT Emails](/blog/dot-permits-pt2/H-DOT Emails.pdf)</p>
<p>His responses met expectations:</p>
<blockquote>
<p>The Iowa Department of Transportation acknowledges receipt of your request, sent
to Director Marler on January 12, 2026.</p>
<p>We understand the importance of establishing a formal policy for license plate
readers and have been actively working on this matter since last fall. At that
time, we prohibited any additional installations of LPR’s on DOT ROW until the
policy is put in place.</p>
<p>We aim to finalize our ALPR policy by the end of February. We appreciate your
expertise and insights on this subject and will ensure that our policy team
has access to review your contributions.</p>
</blockquote>
<p>To which I replied:</p>
<blockquote>
<p>Thank you for the response. While I appreciate that the Department is drafting
a specific ALPR policy, the core of my concern is not a lack of policy, but a
systemic failure to enforce existing Iowa Code and Administrative Rules.</p>
<p>The DOT recently finalized its EO10 review, affirming that the existing
regulations—including those governing the Utility Accommodation Program and
contractor licensing—are necessary and effective. A new policy cannot
retroactively excuse the Department’s decision to ignore those regulations and
standards.</p>
<p>Regarding the “prohibition” on new installations, there appears to be a
disconnect. Since the date you claim a prohibition was enacted, Flock has
expanded its network along the I-380 corridor in Cedar Rapids, including in
the I-380 ROW on state-owned land, and in other municipalities.</p>
<p>If the DOT has been working on this issue since last fall, it raises the
question of why the Department continues to allow unlicensed contractors to
perform work and why these specific permits were not stayed or denied.</p>
<p>By declining to act in a meaningful way while unsafe installations (like the
non-compliant “breakaway pole” on Hwy 52) put drivers at risk, the DOT is
tacitly approving these hazards. In doing so, the Department assumes
significant legal and financial liability for the State should a collision
involving this equipment occur and foreseeably result in injury or death.</p>
</blockquote>
<p>Note the DOT’s claim that it “prohibited any additional installations” since
last fall. Since that date, Flock has expanded its camera network along the
I-380 corridor in Cedar Rapids—including on state-owned land in the I-380
right-of-way—and in other municipalities. The moratorium appears to exist only
in the DOT’s correspondence.</p>
<p>The DOT’s final response:</p>
<blockquote>
<p>We greatly appreciate the time and effort you have invested in bringing these
matters to our attention. Please be assured that we are investigating your
allegations.</p>
</blockquote>
<p>I will be sending in an open records request for the DOT’s new policy at the end
of the month for Part III in this series, unless someone beats me to it.</p>
<p>If you’re in Iowa and you crash your car into a roadside camera, be sure to tell
your lawyer about this post.</p>
<h2>Permit Documents</h2>
<p>The table below lists every LPR permit I have obtained from the Iowa DOT. This
may be a complete set; it is emphatically not a complete accounting of cameras
installed in DOT right-of-way. Many appear to lack permits entirely.</p>
<table>
<thead>
<tr>
<th>Date</th>
<th>Permit / Municipality</th>
<th>Route</th>
</tr>
</thead>
<tbody>
<tr>
<td>2022-04-08</td>
<td>IA-136 LPR</td>
<td>IA-136</td>
</tr>
<tr>
<td>2022-04-08</td>
<td>US-30 LPR</td>
<td>US-30</td>
</tr>
<tr>
<td>2022-08-30</td>
<td>Altoona PD — TCD Application CCP</td>
<td>—</td>
</tr>
<tr>
<td>2022-08-30</td>
<td>Altoona PD — TCD Application</td>
<td>—</td>
</tr>
<tr>
<td>2023-01</td>
<td>Council Bluffs US-275 — LPR TCD</td>
<td>US-275</td>
</tr>
<tr>
<td>2023-01-17</td>
<td>Council Bluffs — Admin</td>
<td>—</td>
</tr>
<tr>
<td>2023-01-24</td>
<td>Council Bluffs US-275 — LPR TCD Approved</td>
<td>US-275</td>
</tr>
<tr>
<td>2023-05-08</td>
<td>Permit</td>
<td>—</td>
</tr>
<tr>
<td>2023-05-30</td>
<td>South Sioux City PD — Woodbury County</td>
<td>—</td>
</tr>
<tr>
<td>2023-10-06</td>
<td>Ankeny PD — LPR Application</td>
<td>—</td>
</tr>
<tr>
<td>2023-10-06</td>
<td>TCD Application</td>
<td>—</td>
</tr>
<tr>
<td>2023-12-22</td>
<td>85A-2023-034 — Story County</td>
<td>US-30</td>
</tr>
<tr>
<td>2023-12-22</td>
<td>Story County Flock TCD</td>
<td>—</td>
</tr>
<tr>
<td>2024-01</td>
<td>Pleasant Hill PD</td>
<td>—</td>
</tr>
<tr>
<td>2024-01</td>
<td>Pleasant Hill</td>
<td>US-65</td>
</tr>
<tr>
<td>2024-01-23</td>
<td>Pleasant Hill</td>
<td>IA-163</td>
</tr>
<tr>
<td>2024</td>
<td>Indianola — LPR Application</td>
<td>—</td>
</tr>
<tr>
<td>2024-05-10</td>
<td>483754 — Marshalltown PD</td>
<td>IA-14</td>
</tr>
<tr>
<td>2024-05-10</td>
<td>502480 — Newton PD</td>
<td>—</td>
</tr>
<tr>
<td>2024-06</td>
<td>Altoona</td>
<td>—</td>
</tr>
<tr>
<td>2024-06-25</td>
<td>Polk City PD</td>
<td>—</td>
</tr>
<tr>
<td>2024-10-25</td>
<td>96A-2024-011 — Winneshiek County, Decorah</td>
<td>IA-9</td>
</tr>
<tr>
<td>2024-10-25</td>
<td>Fayette County, West Plum St</td>
<td>IA-150</td>
</tr>
<tr>
<td>2024-10-25</td>
<td>Fayette County, E Bradford St</td>
<td>US-18</td>
</tr>
<tr>
<td>2024-11-04</td>
<td>33A-2024-014 — Fayette County, Major Rd</td>
<td>IA-150</td>
</tr>
<tr>
<td>2024-11-04</td>
<td>Fayette County, W Ave</td>
<td>IA-3</td>
</tr>
<tr>
<td>2024-11-15</td>
<td>Fayette County, S Avenue</td>
<td>IA-3</td>
</tr>
<tr>
<td>2024</td>
<td>19A-2024-008 — Fayette County</td>
<td>US-63</td>
</tr>
<tr>
<td>2024</td>
<td>19U-2024-009 — Fayette County NHSX</td>
<td>US-63</td>
</tr>
<tr>
<td>2024</td>
<td>19U-2024-009 — Fayette County</td>
<td>US-63</td>
</tr>
<tr>
<td>2024</td>
<td>22A-2024-016 — Fayette County</td>
<td>US-52</td>
</tr>
<tr>
<td>2024</td>
<td>33A-2024-009 — Fayette County</td>
<td>US-18</td>
</tr>
<tr>
<td>2024</td>
<td>33A-2024-010 — Fayette County</td>
<td>IA-150</td>
</tr>
<tr>
<td>2024</td>
<td>33A-2024-013 — Fayette County</td>
<td>IA-3</td>
</tr>
<tr>
<td>2024</td>
<td>33A-2024-014 — Fayette County</td>
<td>IA-150</td>
</tr>
<tr>
<td>2024</td>
<td>33A-2024-015 — Fayette County</td>
<td>IA-3</td>
</tr>
<tr>
<td>2024</td>
<td>3A-2024-008 — Fayette County</td>
<td>US-18</td>
</tr>
<tr>
<td>2024</td>
<td>45U-2024-004 — Fayette County</td>
<td>US-63</td>
</tr>
<tr>
<td>2024</td>
<td>96A-2024-011 — Fayette County</td>
<td>IA-9</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>Sioux City PD</td>
<td>IA-12</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>Storm Lake PD — PTZ and LPR</td>
<td>—</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>Woodbury County SO</td>
<td>—</td>
</tr>
<tr>
<td>2025-02-11</td>
<td>Wapello County SO</td>
<td>—</td>
</tr>
<tr>
<td>2025-02-20</td>
<td>91A-2025-006 — Warren County SO</td>
<td>—</td>
</tr>
<tr>
<td>2025-02-20</td>
<td>Carlisle PD</td>
<td>—</td>
</tr>
<tr>
<td>2025-05-11</td>
<td>29A-2025-001 — Burlington</td>
<td>US-34</td>
</tr>
<tr>
<td>2025</td>
<td>33A-2025-002 — Fayette County</td>
<td>IA-150</td>
</tr>
<tr>
<td>2025</td>
<td>36A-2025-004 — Fremont County</td>
<td>—</td>
</tr>
</tbody>
</table>
<p class="collapsible">@[April 8, 2022 — IA-136 LPR](/dot-permits/2022.04.08 - IA-136 LPR.pdf){.collapsible}
@[April 8, 2022 — US-30 LPR](/dot-permits/2022.04.08 - US-30 LPR.pdf){.collapsible}
@[August 30, 2022 — Altoona PD — TCD Application CCP](/dot-permits/2022.08.30 - Altoona PD - TCD Application CCP.pdf){.collapsible}
@[August 30, 2022 — Altoona PD — TCD Application](/dot-permits/2022.08.30 - Altoona PD - TCD Application.pdf){.collapsible}
@[January 2023 — Council Bluffs US-275 — LPR TCD](/dot-permits/2023.01 - Council Bluffs US-275 - LPR TCD.pdf){.collapsible}
@[January 17, 2023 — Council Bluffs — Admin](/dot-permits/2023.01.17 - Council Bluffs - Admin.pdf){.collapsible}
@[January 24, 2023 — Council Bluffs US-275 — LPR TCD Approved](/dot-permits/2023.01.24 - Council Bluffs US-275 - LPR TCD Approved.pdf){.collapsible}
@[May 8, 2023 — Permit](/dot-permits/2023.05.08 - Permit.pdf){.collapsible}
@[May 30, 2023 — South Sioux City PD — Woodbury County](/dot-permits/2023.05.30 - South Sioux City PD - Woodbury County.pdf){.collapsible}
@[October 6, 2023 — Ankeny PD — LPR Application](/dot-permits/2023.10.06 - Ankeny PD - LPR Application.pdf){.collapsible}
@[October 6, 2023 — TCD Application](/dot-permits/2023.10.06 - TCD Application.pdf){.collapsible}
@[December 22, 2023 — 85A-2023-034 — Story County US-30](/dot-permits/2023.12.22 - 85A-2023-034 - Story County US-30.pdf){.collapsible}
@[December 22, 2023 — Story County Flock TCD](/dot-permits/2023.12.22 - Story County Flock TCD.pdf){.collapsible}
@[January 2024 — Pleasant Hill PD](/dot-permits/2024.01 - Pleasant Hill PD.pdf){.collapsible}
@[January 2024 — Pleasant Hill US-65](/dot-permits/2024.01 - Pleasant Hill US-65.pdf){.collapsible}
@[January 23, 2024 — Pleasant Hill IA-163](/dot-permits/2024.01.23 - Pleasant Hill IA-163.pdf){.collapsible}
@[2024 — Indianola — LPR Application](/dot-permits/2024 - Indianola - LPR Application.pdf){.collapsible}
@[May 10, 2024 — 483754 — Marshalltown PD IA-14](/dot-permits/2024.05.10 - 483754 - Marshalltown PD IA-14.pdf){.collapsible}
@[May 10, 2024 — 502480 — Newton PD](/dot-permits/2024.05.10 - 502480 - Newton PD.pdf){.collapsible}
@[June 2024 — Altoona](/dot-permits/2024.06 - Altoona.pdf){.collapsible}
@[June 25, 2024 — Polk City PD](/dot-permits/2024.06.25 - Polk City PD.pdf){.collapsible}
@[October 25, 2024 — 96A-2024-011 — Winneshiek County IA-9 Decorah](/dot-permits/2024.10.25 - 96A-2024-011 - Winneshiek County IA-9 Decorah.pdf){.collapsible}
@[October 25, 2024 — Fayette County IA-150 West Plum St](/dot-permits/2024.10.25 - Fayette County IA-150 West Plum St.pdf){.collapsible}
@[October 25, 2024 — Fayette County US-18 E Bradford St](/dot-permits/2024.10.25 - Fayette County US-18 E Bradford St.pdf){.collapsible}
@[November 4, 2024 — 33A-2024-014 — Fayette County IA-150 Major Rd](/dot-permits/2024.11.04 - 33A-2024-014 - Fayette County IA-150 Major Rd.pdf){.collapsible}
@[November 4, 2024 — Fayette County IA-3 W Ave](/dot-permits/2024.11.04 - Fayette County IA-3 W Ave.pdf){.collapsible}
@[November 15, 2024 — Fayette County IA-3 S Avenue](/dot-permits/2024.11.15 - Fayette County IA-3 S Avenue.pdf){.collapsible}
@[2024 — 19A-2024-008 — Fayette County US-63](/dot-permits/2024 - 19A-2024-008 - Fayette County US-63.pdf){.collapsible}
@[2024 — 19U-2024-009 — Fayette County US-63 NHSX](/dot-permits/2024 - 19U-2024-009 - Fayette County US-63 NHSX.pdf){.collapsible}
@[2024 — 19U-2024-009 — Fayette County US-63](/dot-permits/2024 - 19U-2024-009 - Fayette County US-63.pdf){.collapsible}
@[2024 — 22A-2024-016 — Fayette County US-52](/dot-permits/2024 - 22A-2024-016 - Fayette County US-52.pdf){.collapsible}
@[2024 — 33A-2024-009 — Fayette County US-18](/dot-permits/2024 - 33A-2024-009 - Fayette County US-18.pdf){.collapsible}
@[2024 — 33A-2024-010 — Fayette County IA-150](/dot-permits/2024 - 33A-2024-010 - Fayette County IA-150.pdf){.collapsible}
@[2024 — 33A-2024-013 — Fayette County IA-3](/dot-permits/2024 - 33A-2024-013 - Fayette County IA-3.pdf){.collapsible}
@[2024 — 33A-2024-014 — Fayette County IA-150](/dot-permits/2024 - 33A-2024-014 - Fayette County IA-150.pdf){.collapsible}
@[2024 — 33A-2024-015 — Fayette County IA-3](/dot-permits/2024 - 33A-2024-015 - Fayette County IA-3.pdf){.collapsible}
@[2024 — 3A-2024-008 — Fayette County US-18](/dot-permits/2024 - 3A-2024-008 - Fayette County US-18.pdf){.collapsible}
@[2024 — 45U-2024-004 — Fayette County US-63](/dot-permits/2024 - 45U-2024-004 - Fayette County US-63.pdf){.collapsible}
@[2024 — 96A-2024-011 — Fayette County IA-9](/dot-permits/2024 - 96A-2024-011 - Fayette County IA-9.pdf){.collapsible}
@[December 16, 2024 — Sioux City PD IA-12](/dot-permits/2024.12.16 - Sioux City PD IA-12.pdf){.collapsible}
@[December 16, 2024 — Storm Lake PD — PTZ and LPR](/dot-permits/2024.12.16 - Storm Lake PD - PTZ and LPR.pdf){.collapsible}
@[December 16, 2024 — Woodbury County SO](/dot-permits/2024.12.16 - Woodbury County SO.pdf){.collapsible}
@[February 11, 2025 — Wapello County SO](/dot-permits/2025.02.11 - Wapello County SO.pdf){.collapsible}
@[February 20, 2025 — 91A-2025-006 — Warren County SO](/dot-permits/2025.02.20 - 91A-2025-006 - Warren County SO.pdf){.collapsible}
@[February 20, 2025 — Carlisle PD](/dot-permits/2025.02.20 - Carlisle PD.pdf){.collapsible}
@[May 11, 2025 — 29A-2025-001 — Burlington US-34](/dot-permits/2025.05.11 - 29A-2025-001 - Burlington US-34.pdf){.collapsible}
@[2025 — 33A-2025-002 — Fayette County IA-150](/dot-permits/2025 - 33A-2025-002 - Fayette County IA-150.pdf){.collapsible}
@[2025 — 36A-2025-004 — Fremont County](/dot-permits/2025 - 36A-2025-004 - Fremont County.pdf)</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>I have previously brought several matters to the attention of
Director Marler. In 2020, I petitioned him to amend rules governing the
DOT’s flawed immigration database. He declined, which contributed to the
widely-reported <a href="https://sos.iowa.gov/news-resources/statement-secretary-state-paul-pate-noncitizen-voting">discovery of 2,207 non-citizen voters</a> in 2024—a
number that turned out to be <a href="https://sos.iowa.gov/news-resources/iowa-secretary-states-audit-voter-registration-lists-finds-277-confirmed-noncitizens">just 277</a> because of the very flaw I
had identified. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[FOIA Mode: Results and General Availability]]></title>
            <link>https://footnote4a.org/news/foia-mode</link>
            <guid isPermaLink="false">https://footnote4a.org/news/foia-mode</guid>
            <pubDate>Thu, 05 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Watching you watch me. Sideways.]]></description>
            <content:encoded><![CDATA[<p>To serve <a href="http://haveibeenflocked.com">haveibeenflocked.com</a>’s government customers, this website has had a
secret feature called “FOIA mode” for a little while now. It was a
government-grade product that delivers information to municipal lawyers in the
style and format that they are most familiar with. Today, we are proud to announce
the style’s general availability for all <a href="http://haveibeenflocked.com">haveibeenflocked.com</a> users.</p>
<p>FOIA mode is now available from the theme selector in the top right:</p>
<p><img src="https://footnote4a.org/blog/foia-mode/menu.png" alt="Theme menu showing FOIA mode" width="500"></p>
<p>Enabling FOIA mode will style the page in … well, FOIA mode:</p>
<p><img src="https://footnote4a.org/blog/foia-mode/screenshot.png" alt="FOIA mode demonstrations"></p>
<p>In FOIA mode, an advanced simulator will simulate printing the page in black and
white, it will apply redactions at random, without legal justification, before
finally simulating scanning it at an angle to prevent successful character
recognition and text extraction.</p>
<p>It is certainly the most inefficient way to render data, but it appears the one
the government prefers; <em>Roma locuta, causa finita</em>.</p>
<p>You’re welcome.</p>
<h2>FOIAing the FOIAers</h2>
<p><a href="http://haveibeenflocked.com">haveibeenflocked.com</a> retains no data on its regular visitors, but the <a href="https://footnote4a.org/about/privacy-policy">privacy
policy</a> does permit collecting and retaining data on
government visitors.</p>
<p>Although accessing the public records maintained on your local police
department’s transparency portal is <a href="https://footnote4a.org/news/more-burdensome-transparency">impossible when you’re using a
VPN</a>, anyone is welcome to visit this site
using one. In fact, the <a href="https://footnote4a.org/news/fbi-investigation">Houston HIDTA bulletin</a> that
was forwarded by the FBI notes:</p>
<blockquote>
<p>Law enforcement should be cautious when accessing <a href="http://haveibeenflocked.com">haveibeenflocked.com</a>, as it
is unknown what information the site may be collecting. It is recommended that
this website not be accessed by any computer that is connected to a law
enforcement agency network</p>
</blockquote>
<p>Below are the aggregate numbers of requests from government networks since about
two weeks after that bulletin was forwarded to the broader “intelligence
community” by the FBI.</p>
<div class="markdown-alert markdown-alert-note">
<p class="markdown-alert-title">Note</p>
<p><strong>To the U.S. Department of Justice (#6) and the FBI’s Criminal Justice
Information Services (#9)</strong>: I’m glad you’re enjoying the website while
ignoring your own security recommendation, and you’re welcome to keep doing
so, but please don’t forget to reply to my emails and letters; they contain
important information about your security recommendations being ignored.</p>
</div>
<table>
<thead>
<tr>
<th>Network</th>
<th style="text-align:right">Visits</th>
</tr>
</thead>
<tbody>
<tr>
<td>City of Fort Collins</td>
<td style="text-align:right">965</td>
</tr>
<tr>
<td>The County of Erie</td>
<td style="text-align:right">878</td>
</tr>
<tr>
<td>King County Gov</td>
<td style="text-align:right">866</td>
</tr>
<tr>
<td>The Municipal Communications Utility of the City of Cedar Falls Iowa</td>
<td style="text-align:right">776</td>
</tr>
<tr>
<td>State of Minnesota</td>
<td style="text-align:right">378</td>
</tr>
<tr>
<td>U. S. Department of Justice</td>
<td style="text-align:right">375</td>
</tr>
<tr>
<td>City of Chicago</td>
<td style="text-align:right">343</td>
</tr>
<tr>
<td>Michigan State Government</td>
<td style="text-align:right">316</td>
</tr>
<tr>
<td>FBI Criminal Justice Information Services</td>
<td style="text-align:right">287</td>
</tr>
<tr>
<td>State of Colorado General Government Computer</td>
<td style="text-align:right">282</td>
</tr>
<tr>
<td>City of Tacoma</td>
<td style="text-align:right">276</td>
</tr>
<tr>
<td>State of North Dakota ITD</td>
<td style="text-align:right">271</td>
</tr>
<tr>
<td>Clackamas County</td>
<td style="text-align:right">253</td>
</tr>
<tr>
<td>United States Department of Defense (DoD)</td>
<td style="text-align:right">204</td>
</tr>
<tr>
<td>State of Kansas</td>
<td style="text-align:right">191</td>
</tr>
<tr>
<td>Collier County Government</td>
<td style="text-align:right">186</td>
</tr>
<tr>
<td>City of Seattle Dept. of Admin. Services</td>
<td style="text-align:right">182</td>
</tr>
<tr>
<td>State of Arizona</td>
<td style="text-align:right">175</td>
</tr>
<tr>
<td>City of Indianapolis</td>
<td style="text-align:right">172</td>
</tr>
<tr>
<td>State Of Arkansas Division of Information Systems</td>
<td style="text-align:right">166</td>
</tr>
<tr>
<td>Jefferson County Sheriff’s Office</td>
<td style="text-align:right">160</td>
</tr>
<tr>
<td>City of Houston</td>
<td style="text-align:right">154</td>
</tr>
<tr>
<td>Department of Administrative Services</td>
<td style="text-align:right">154</td>
</tr>
<tr>
<td>State of Washington</td>
<td style="text-align:right">153</td>
</tr>
<tr>
<td>City of Concord</td>
<td style="text-align:right">147</td>
</tr>
<tr>
<td>Florida Department of Management Services - Division of Telecommunications</td>
<td style="text-align:right">141</td>
</tr>
<tr>
<td>City of Thornton</td>
<td style="text-align:right">139</td>
</tr>
<tr>
<td>City of Westfield (Gas &amp; Electric Light Department)</td>
<td style="text-align:right">133</td>
</tr>
<tr>
<td>State of Utah</td>
<td style="text-align:right">131</td>
</tr>
<tr>
<td>City of Yakima</td>
<td style="text-align:right">130</td>
</tr>
<tr>
<td>Grant County Public Utility District</td>
<td style="text-align:right">124</td>
</tr>
<tr>
<td>Yakima County</td>
<td style="text-align:right">114</td>
</tr>
<tr>
<td>City of Arvada</td>
<td style="text-align:right">105</td>
</tr>
<tr>
<td>STATE OF DELAWARE</td>
<td style="text-align:right">105</td>
</tr>
<tr>
<td>Snohomish County Government</td>
<td style="text-align:right">104</td>
</tr>
<tr>
<td>Washington County Oregon</td>
<td style="text-align:right">102</td>
</tr>
<tr>
<td>Government of the District of Columbia</td>
<td style="text-align:right">101</td>
</tr>
<tr>
<td>U.S. Department of Veterans Affairs</td>
<td style="text-align:right">97</td>
</tr>
<tr>
<td>City of Virginia Beach Virginia</td>
<td style="text-align:right">95</td>
</tr>
<tr>
<td>Fairfax County Dept of Information Technology</td>
<td style="text-align:right">95</td>
</tr>
<tr>
<td>CLARKSVILLE DEPARTMENT OF ELECTRICITY</td>
<td style="text-align:right">90</td>
</tr>
<tr>
<td>California Department of Technology</td>
<td style="text-align:right">89</td>
</tr>
<tr>
<td>City of St. Louis</td>
<td style="text-align:right">88</td>
</tr>
<tr>
<td>State of Idaho</td>
<td style="text-align:right">84</td>
</tr>
<tr>
<td>Palm Beach County</td>
<td style="text-align:right">83</td>
</tr>
<tr>
<td>State of WI Dept. of Administration</td>
<td style="text-align:right">81</td>
</tr>
<tr>
<td>City of Yuma</td>
<td style="text-align:right">77</td>
</tr>
<tr>
<td>Metropolitan Tulsa Electronic Network</td>
<td style="text-align:right">74</td>
</tr>
<tr>
<td>City of Mesa</td>
<td style="text-align:right">73</td>
</tr>
<tr>
<td>City of North Kansas City MO</td>
<td style="text-align:right">73</td>
</tr>
<tr>
<td>Local Government Information Systems Association</td>
<td style="text-align:right">72</td>
</tr>
<tr>
<td>City of Vallejo A municipal corporation</td>
<td style="text-align:right">71</td>
</tr>
<tr>
<td>Manatee County Government</td>
<td style="text-align:right">71</td>
</tr>
<tr>
<td>State of Nebraska / Office of the CIO</td>
<td style="text-align:right">71</td>
</tr>
<tr>
<td>COUNTY OF SAN BERNARDINO</td>
<td style="text-align:right">68</td>
</tr>
<tr>
<td>Los Angeles Sheriff’s Department</td>
<td style="text-align:right">68</td>
</tr>
<tr>
<td>Palm Beach County Sheriff’s Office</td>
<td style="text-align:right">68</td>
</tr>
<tr>
<td>State of New Hampshire</td>
<td style="text-align:right">68</td>
</tr>
<tr>
<td>City of Sunnyvale</td>
<td style="text-align:right">67</td>
</tr>
<tr>
<td>Volusia County Clerk of the Courts</td>
<td style="text-align:right">65</td>
</tr>
<tr>
<td>City of Rock Hill SC</td>
<td style="text-align:right">63</td>
</tr>
<tr>
<td>City of Daytona Beach</td>
<td style="text-align:right">61</td>
</tr>
<tr>
<td>City of Scottsdale</td>
<td style="text-align:right">59</td>
</tr>
<tr>
<td>City of Boston</td>
<td style="text-align:right">56</td>
</tr>
<tr>
<td>DEPARTMENT OF HOMELAND SECURITY</td>
<td style="text-align:right">56</td>
</tr>
<tr>
<td>Greenville County</td>
<td style="text-align:right">56</td>
</tr>
<tr>
<td>City of Colorado Springs</td>
<td style="text-align:right">55</td>
</tr>
<tr>
<td>Hennepin County</td>
<td style="text-align:right">55</td>
</tr>
<tr>
<td>City of Philadelphia</td>
<td style="text-align:right">54</td>
</tr>
<tr>
<td>South Dakota State Government</td>
<td style="text-align:right">53</td>
</tr>
<tr>
<td>City of Baytown</td>
<td style="text-align:right">52</td>
</tr>
<tr>
<td>City of Phoenix</td>
<td style="text-align:right">50</td>
</tr>
<tr>
<td>Alameda County</td>
<td style="text-align:right">49</td>
</tr>
<tr>
<td>The City of Wadsworth</td>
<td style="text-align:right">49</td>
</tr>
<tr>
<td>City of Austin Texas</td>
<td style="text-align:right">48</td>
</tr>
<tr>
<td>Dallas County Of</td>
<td style="text-align:right">48</td>
</tr>
<tr>
<td>Cherokee County Electric Cooperative Association</td>
<td style="text-align:right">47</td>
</tr>
<tr>
<td>San Diego County Office of Education</td>
<td style="text-align:right">46</td>
</tr>
<tr>
<td>City of Buckeye</td>
<td style="text-align:right">45</td>
</tr>
<tr>
<td>City of Irvine</td>
<td style="text-align:right">45</td>
</tr>
<tr>
<td>Pima County</td>
<td style="text-align:right">45</td>
</tr>
<tr>
<td>The City of New York</td>
<td style="text-align:right">44</td>
</tr>
<tr>
<td>City of New Smyrna Beach</td>
<td style="text-align:right">43</td>
</tr>
<tr>
<td>City of Redmond Washington</td>
<td style="text-align:right">43</td>
</tr>
<tr>
<td>Hamilton County Communications Inc</td>
<td style="text-align:right">42</td>
</tr>
<tr>
<td>Jackson County Rural Electric Membership Corporation</td>
<td style="text-align:right">42</td>
</tr>
<tr>
<td>City of Anaheim</td>
<td style="text-align:right">41</td>
</tr>
<tr>
<td>Riverside County Office of Education</td>
<td style="text-align:right">41</td>
</tr>
<tr>
<td>City of Pella</td>
<td style="text-align:right">40</td>
</tr>
<tr>
<td>Public Utility District No. 1 of Okanogan County</td>
<td style="text-align:right">40</td>
</tr>
<tr>
<td>CITY AND COUNTY OF DENVER</td>
<td style="text-align:right">39</td>
</tr>
<tr>
<td>City of Bardstown Kentucky</td>
<td style="text-align:right">39</td>
</tr>
<tr>
<td>United States Department of the Treasury</td>
<td style="text-align:right">39</td>
</tr>
<tr>
<td>County of Monroe</td>
<td style="text-align:right">38</td>
</tr>
<tr>
<td>Jefferson County Commission</td>
<td style="text-align:right">38</td>
</tr>
<tr>
<td>State of Missouri Office of Administration</td>
<td style="text-align:right">38</td>
</tr>
<tr>
<td>Boulder County Government</td>
<td style="text-align:right">37</td>
</tr>
<tr>
<td>State of South Carolina</td>
<td style="text-align:right">37</td>
</tr>
<tr>
<td>City of LaGrange Georgia</td>
<td style="text-align:right">36</td>
</tr>
<tr>
<td>Solano County Office of Education</td>
<td style="text-align:right">36</td>
</tr>
<tr>
<td>Navy Network Information Center (NNIC)</td>
<td style="text-align:right">35</td>
</tr>
<tr>
<td>State of Oregon</td>
<td style="text-align:right">35</td>
</tr>
<tr>
<td>City of Akron</td>
<td style="text-align:right">34</td>
</tr>
<tr>
<td>City of Toledo</td>
<td style="text-align:right">34</td>
</tr>
<tr>
<td>Gwinnett County Public Schools</td>
<td style="text-align:right">34</td>
</tr>
<tr>
<td>OCBA</td>
<td style="text-align:right">33</td>
</tr>
<tr>
<td>City of Griffin</td>
<td style="text-align:right">32</td>
</tr>
<tr>
<td>CACI Inc. Federal</td>
<td style="text-align:right">31</td>
</tr>
<tr>
<td>City of Wyandotte</td>
<td style="text-align:right">31</td>
</tr>
<tr>
<td>Federal Aviation Administration</td>
<td style="text-align:right">31</td>
</tr>
<tr>
<td>Hillsborough County Board of Commissioners</td>
<td style="text-align:right">31</td>
</tr>
<tr>
<td>Weld County Government</td>
<td style="text-align:right">31</td>
</tr>
<tr>
<td>City of Columbus</td>
<td style="text-align:right">30</td>
</tr>
<tr>
<td>San Francisco Department of Telecommunications and Information Services</td>
<td style="text-align:right">30</td>
</tr>
<tr>
<td>U.S. Department of the Interior</td>
<td style="text-align:right">30</td>
</tr>
<tr>
<td>City of Los Angeles</td>
<td style="text-align:right">27</td>
</tr>
<tr>
<td>City of Morganton</td>
<td style="text-align:right">27</td>
</tr>
<tr>
<td>City of Orlando - Information Systems</td>
<td style="text-align:right">27</td>
</tr>
<tr>
<td>Contra Costa County Office of Education</td>
<td style="text-align:right">27</td>
</tr>
<tr>
<td>Madera County Office of Education</td>
<td style="text-align:right">27</td>
</tr>
<tr>
<td>Mississippi Department of Information Technology Services (ITS)</td>
<td style="text-align:right">27</td>
</tr>
<tr>
<td>Santa Clara County</td>
<td style="text-align:right">27</td>
</tr>
<tr>
<td>State of Wyoming Department A&amp;I</td>
<td style="text-align:right">27</td>
</tr>
<tr>
<td>City of Redding</td>
<td style="text-align:right">26</td>
</tr>
<tr>
<td>Baltimore County Government</td>
<td style="text-align:right">25</td>
</tr>
<tr>
<td>European Police Office (EuroPol)</td>
<td style="text-align:right">25</td>
</tr>
<tr>
<td>Pinal County Arizona</td>
<td style="text-align:right">24</td>
</tr>
<tr>
<td>Board of Commissioners of the County of Allen</td>
<td style="text-align:right">23</td>
</tr>
<tr>
<td>City of Monroe</td>
<td style="text-align:right">23</td>
</tr>
<tr>
<td>County of Riverside</td>
<td style="text-align:right">23</td>
</tr>
<tr>
<td>Fort Bend County</td>
<td style="text-align:right">23</td>
</tr>
<tr>
<td>Pierce County</td>
<td style="text-align:right">23</td>
</tr>
<tr>
<td>Stafford County Public Schools</td>
<td style="text-align:right">23</td>
</tr>
<tr>
<td>County Of Dutchess NY</td>
<td style="text-align:right">22</td>
</tr>
<tr>
<td>CGI Federal</td>
<td style="text-align:right">21</td>
</tr>
<tr>
<td>City of Hudson Ohio</td>
<td style="text-align:right">21</td>
</tr>
<tr>
<td>City of Iowa City</td>
<td style="text-align:right">21</td>
</tr>
<tr>
<td>City of Nampa</td>
<td style="text-align:right">21</td>
</tr>
<tr>
<td>City of Rock Falls</td>
<td style="text-align:right">21</td>
</tr>
<tr>
<td>City of Wichita</td>
<td style="text-align:right">21</td>
</tr>
<tr>
<td>Federal Deposit Insurance Corporation</td>
<td style="text-align:right">21</td>
</tr>
<tr>
<td>Headquarters USAISC</td>
<td style="text-align:right">21</td>
</tr>
<tr>
<td>State of Connecticut</td>
<td style="text-align:right">21</td>
</tr>
<tr>
<td>Tompkins County</td>
<td style="text-align:right">21</td>
</tr>
<tr>
<td>U.S. Department of Energy</td>
<td style="text-align:right">21</td>
</tr>
<tr>
<td>County of San Bernardino</td>
<td style="text-align:right">20</td>
</tr>
<tr>
<td>Electric Plant Board of the City of Glasgow Kentucky</td>
<td style="text-align:right">20</td>
</tr>
<tr>
<td>City of Pearland</td>
<td style="text-align:right">19</td>
</tr>
<tr>
<td>City of Pharr TX</td>
<td style="text-align:right">19</td>
</tr>
<tr>
<td>County of Albemarle</td>
<td style="text-align:right">19</td>
</tr>
<tr>
<td>Department of Public Health</td>
<td style="text-align:right">19</td>
</tr>
<tr>
<td>City of Huntington Beach</td>
<td style="text-align:right">18</td>
</tr>
<tr>
<td>County of Loudoun Virginia</td>
<td style="text-align:right">18</td>
</tr>
<tr>
<td>City of Anacortes</td>
<td style="text-align:right">17</td>
</tr>
<tr>
<td>County of Kane</td>
<td style="text-align:right">17</td>
</tr>
<tr>
<td>University of Maryland Baltimore County (UMBC)</td>
<td style="text-align:right">17</td>
</tr>
<tr>
<td>Bulloch County Rural Telephone Cooperative Inc</td>
<td style="text-align:right">16</td>
</tr>
<tr>
<td>CITY OF MADISON</td>
<td style="text-align:right">16</td>
</tr>
<tr>
<td>City of Plano Texas</td>
<td style="text-align:right">16</td>
</tr>
<tr>
<td>City of Santa Cruz</td>
<td style="text-align:right">16</td>
</tr>
<tr>
<td>Fresno County Sheriff’s Office</td>
<td style="text-align:right">16</td>
</tr>
<tr>
<td>Luzerne County</td>
<td style="text-align:right">16</td>
</tr>
<tr>
<td>State of Nevada</td>
<td style="text-align:right">16</td>
</tr>
<tr>
<td>City of El Paso</td>
<td style="text-align:right">15</td>
</tr>
<tr>
<td>City of Portland</td>
<td style="text-align:right">15</td>
</tr>
<tr>
<td>City of Richardson</td>
<td style="text-align:right">15</td>
</tr>
<tr>
<td>City of Tucson</td>
<td style="text-align:right">15</td>
</tr>
<tr>
<td>Dutchess County BOCES</td>
<td style="text-align:right">15</td>
</tr>
<tr>
<td>Washoe County</td>
<td style="text-align:right">15</td>
</tr>
<tr>
<td>Alameda County Office of Education</td>
<td style="text-align:right">14</td>
</tr>
<tr>
<td>City and County of Honolulu</td>
<td style="text-align:right">14</td>
</tr>
<tr>
<td>City of Chandler</td>
<td style="text-align:right">14</td>
</tr>
<tr>
<td>City of Eau Claire</td>
<td style="text-align:right">14</td>
</tr>
<tr>
<td>City of Olathe</td>
<td style="text-align:right">14</td>
</tr>
<tr>
<td>State of New Mexico</td>
<td style="text-align:right">14</td>
</tr>
<tr>
<td>United States Capitol Police</td>
<td style="text-align:right">14</td>
</tr>
<tr>
<td>City of Des Moines</td>
<td style="text-align:right">13</td>
</tr>
<tr>
<td>City of Raleigh</td>
<td style="text-align:right">13</td>
</tr>
<tr>
<td>City of Sandy</td>
<td style="text-align:right">13</td>
</tr>
<tr>
<td>Deschutes County</td>
<td style="text-align:right">13</td>
</tr>
<tr>
<td>Douglas County PUD</td>
<td style="text-align:right">13</td>
</tr>
<tr>
<td>Maricopa County Government</td>
<td style="text-align:right">13</td>
</tr>
<tr>
<td>Orange County Department of Education</td>
<td style="text-align:right">13</td>
</tr>
<tr>
<td>Orange County Florida</td>
<td style="text-align:right">13</td>
</tr>
<tr>
<td>Pinellas County Government</td>
<td style="text-align:right">13</td>
</tr>
<tr>
<td>Washington County Cooperative Library Services</td>
<td style="text-align:right">13</td>
</tr>
<tr>
<td>4-County Electric Power Association</td>
<td style="text-align:right">12</td>
</tr>
<tr>
<td>City of Roseville - Minnesota</td>
<td style="text-align:right">12</td>
</tr>
<tr>
<td>County of Napa MIS</td>
<td style="text-align:right">12</td>
</tr>
<tr>
<td>County of San Luis Obispo</td>
<td style="text-align:right">12</td>
</tr>
<tr>
<td>Department of Homeland Security</td>
<td style="text-align:right">12</td>
</tr>
<tr>
<td>Fairfax County Public Schools</td>
<td style="text-align:right">12</td>
</tr>
<tr>
<td>Milwaukee County Government</td>
<td style="text-align:right">12</td>
</tr>
<tr>
<td>Montgomery County Government Maryland</td>
<td style="text-align:right">12</td>
</tr>
<tr>
<td>Stanislaus County Office of Education</td>
<td style="text-align:right">12</td>
</tr>
<tr>
<td>City of Albuquerque</td>
<td style="text-align:right">11</td>
</tr>
<tr>
<td>City of Columbia MO</td>
<td style="text-align:right">11</td>
</tr>
<tr>
<td>Johnson County Community College</td>
<td style="text-align:right">11</td>
</tr>
<tr>
<td>Leon County Board of County Commisioners</td>
<td style="text-align:right">11</td>
</tr>
<tr>
<td>Albemarle County Public Schools</td>
<td style="text-align:right">10</td>
</tr>
<tr>
<td>City of Fort Worth</td>
<td style="text-align:right">10</td>
</tr>
<tr>
<td>City of Gainesville</td>
<td style="text-align:right">10</td>
</tr>
<tr>
<td>City of Garden Grove</td>
<td style="text-align:right">10</td>
</tr>
<tr>
<td>City of San Diego</td>
<td style="text-align:right">10</td>
</tr>
<tr>
<td>Clay County Connect Inc</td>
<td style="text-align:right">10</td>
</tr>
<tr>
<td>Electric Plant Board of the city of Franklin Kentucky</td>
<td style="text-align:right">10</td>
</tr>
<tr>
<td>McHenry County</td>
<td style="text-align:right">10</td>
</tr>
<tr>
<td>Rhode Island State Police</td>
<td style="text-align:right">10</td>
</tr>
<tr>
<td>Solano County</td>
<td style="text-align:right">10</td>
</tr>
<tr>
<td>State of NC - State Telecommunications Services</td>
<td style="text-align:right">10</td>
</tr>
<tr>
<td>City of Jacksonville Florida</td>
<td style="text-align:right">9</td>
</tr>
<tr>
<td>City of Palo Alto</td>
<td style="text-align:right">9</td>
</tr>
<tr>
<td>County of Placer</td>
<td style="text-align:right">9</td>
</tr>
<tr>
<td>Los Angeles County Office of Education</td>
<td style="text-align:right">9</td>
</tr>
<tr>
<td>Montgomery County Intermediate Unit</td>
<td style="text-align:right">9</td>
</tr>
<tr>
<td>Sedgwick County Information Services</td>
<td style="text-align:right">9</td>
</tr>
<tr>
<td>Warren County Board of Commissioners</td>
<td style="text-align:right">9</td>
</tr>
<tr>
<td>Berks County Intermediate Unit</td>
<td style="text-align:right">8</td>
</tr>
<tr>
<td>Bucks County Community College</td>
<td style="text-align:right">8</td>
</tr>
<tr>
<td>City of Cartersville</td>
<td style="text-align:right">8</td>
</tr>
<tr>
<td>City of Irving</td>
<td style="text-align:right">8</td>
</tr>
<tr>
<td>City of Tulsa</td>
<td style="text-align:right">8</td>
</tr>
<tr>
<td>Institute for Defense Analyses</td>
<td style="text-align:right">8</td>
</tr>
<tr>
<td>Macomb County Michigan</td>
<td style="text-align:right">8</td>
</tr>
<tr>
<td>Metropolitan Government of Nashville and Davidson County Tennessee</td>
<td style="text-align:right">8</td>
</tr>
<tr>
<td>Santa Barbara County Education Office</td>
<td style="text-align:right">8</td>
</tr>
<tr>
<td>Tarrant County</td>
<td style="text-align:right">8</td>
</tr>
<tr>
<td>The School District of Palm Beach County</td>
<td style="text-align:right">8</td>
</tr>
<tr>
<td>U.S. Department of State</td>
<td style="text-align:right">8</td>
</tr>
<tr>
<td>Alachua County BOCC</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>Amazon Data Services Ireland Ltd</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>Beacon Federal Credit Union</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>Black Hills Federal Credit Union</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>California Department of Transportation</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>City of Burbank</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>City of Charlotte</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>City of Greenville NC</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>County of Bergen</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>County of Henrico</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>Cuyahoga County Information Services center</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>Hennepin County Medical Center</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>Jefferson County Colorado</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>Lane County</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>Lexington-Fayette Urban County Government</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>Monroe County Community School Corporation</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>Prince William County Public Schools</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>State of Connecticut Judicial Branch</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>State of Montana</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>Wisconsin Department of Justice</td>
<td style="text-align:right">7</td>
</tr>
<tr>
<td>Air Force Systems Networking</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>Arkansas Department of Transportation</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>Blount County Government</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>City of Buffalo</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>City of Greensboro NC</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>City of Mont Belvieu</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>City of Oakland</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>City of Roseville</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>CITY OF ST. CLOUD</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>Clark County Computer Connections</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>Collier County Public Schools</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>COUNTY OF SONOMA</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>County of Ventura</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>County of Westchester</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>East Baton Rouge Sheriff</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>Frederick County Government</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>Harris County Hospital District</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>Harris County Public Library</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>Larimer County Government</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>LOS ANGELES COUNTY - INTERNAL SERVICESDIVISION</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>MIFFLIN COUNTY WIRELESS LLC</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>Ministry of Education - EMISC</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>Monmouth County</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>New York City Police Department</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>PROCERGS - Cia de Processamento de Dados do RGS</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>Santa Barbara County</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>Sarasota County Government</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>Tri-County Metropolitan Transit District</td>
<td style="text-align:right">6</td>
</tr>
<tr>
<td>City of Amarillo</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>City of El Reno</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>City of San Jose</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Cook County</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>County of Madera</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Delaware Division of Libraries State of Delaware</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Douglas County School District RE.1</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Federal Home Loan Mortgage Corporation</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Fresno County Office of Education</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Griggs County Telephone Co</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Kratos Defense &amp; Security Solutions Inc</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Madison County Telephone Company</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Maricopa County Community College District</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Newaygo County Regional Educational Service Agency</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Santa Clara County Office of Education</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>State of Alabama Office of Information Technology</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>State of Hawaii</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>State of New Jersey Judiciary</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>STEUBEN COUNTY RURAL ELECTRIC MEMBERSHIP CORPORATION</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Anne Arundel County Maryland</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>Brazos County</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>California Department of Justice</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>CITY OF CARROLLTON - TEXAS</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>City of Charlottesville</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>City of Cookeville</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>City of Longmont</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>City of Maricopa</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>City of Mesquite Texas</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>City of Modesto</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>City of Pittsburgh</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>City of Radford</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>City of Rocklin</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>City of Savannah</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>City of Winston-Salem</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>DeKalb County School District</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>Federal Reserve Board</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>Franklin County</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>Hamilton County Ohio</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>Las Vegas Metropolitan Police Department</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>McHenry County College District 528</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>Navy Federal Credit Union</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>Polk County Public Schools</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>SchoolsFirst Federal Credit Union</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>The County of El Paso</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>Travis County Texas</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>Washington County Board of Education</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>Wayne County Regional Educational Service Agency</td>
<td style="text-align:right">4</td>
</tr>
<tr>
<td>Adams County Colorado</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>CALUMET COUNTY</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>City of Clovis</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>CITY OF FALLS CHURCH</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>City of Marshall</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>City of Pasadena</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>City of Tampa Florida</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Clark County Nevada</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Clark County School District</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Columbia County Georgia</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>County of Marin</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>County of Monterey</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>County of Montgomery</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>DeKalb County Georgia</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Hamilton County</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Lewis County PUD</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>LOUISVILLE AND JEFFERSON COUNTY METROPOLITAN SEWER DISTRICT</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Lubbock County</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Mapleton School District No. 1 in the county of Adams &amp; St</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Nassau County BOCES</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>National Credit Union Administration</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Nova Scotia Department of Education</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Nova Scotia Provincial Government</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Prince William County Government Department of IT (DoIT)</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Randolph-Brooks Federal Credit Union</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>San Joaquin County</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Security Service Federal Credit Union</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Texas Department of Information Resources</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>The Tri-County Telephone Association Inc</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Tri-County Fiber Communications LLC</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Utilities Board of the City of Sylacauga</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Washington State Department of Transportation</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Alameda County Library</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>ANGELINA COUNTY</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>Arlington County Government</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>Broward County</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>Bucks County Intermediate Unit #22</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>Carroll County Government</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>City of Fresno</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>City of Georgetown</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>City of Hampton Virginia</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>City of Hilliard</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>City of Hillsboro</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>City of Mountain View</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>CITY OF NORTH RICHLAND HILLS</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>County of Morris OIT</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>County of Tulare</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>East Allen County Schools</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>Howard County Maryland</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>Los Angeles County Metropolitan Transportation Authority</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>Miami-Dade County</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>Monroe County</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>Municipality of the County of Pictou</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>Santa Cruz County Office of Education</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>St. Clair County Regional Educational Service Agency</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>Superior Court of California County of Sacramento</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>Wake County Public School System</td>
<td style="text-align:right">2</td>
</tr>
<tr>
<td>ACT Government InTACT Group</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>Buffalo &amp; Erie County Public Library</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>CITY OF DOTHAN</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>City of Hope Medical Center</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>City of Murphy</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>County Broadband Ltd</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>County of Lake</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>General Department of Taxation</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>Harris County</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>Hillsborough County Aviation Authority</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>Jasper County REMC</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>SERVICO FEDERAL DE PROCESSAMENTO DE DADOS - SERPRO</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>SERVITELCONET CIA. LTDA</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>State of Louisiana Office of Technology Services</td>
<td style="text-align:right">1</td>
</tr>
<tr>
<td>UTAH COMMUNITY FEDERAL CREDIT UNION</td>
<td style="text-align:right">1</td>
</tr>
</tbody>
</table>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>foia-transparency</category>
        </item>
        <item>
            <title><![CDATA[Red Team, Red Flags: Flock's Bishop Fox Engagement Creates Compliance Nightmare]]></title>
            <link>https://footnote4a.org/news/bishop-fox</link>
            <guid isPermaLink="false">https://footnote4a.org/news/bishop-fox</guid>
            <pubDate>Mon, 02 Feb 2026 13:00:00 GMT</pubDate>
            <description><![CDATA[Flock Safety hired Bishop Fox for adversarial security testing. Under CJIS rules, successful testing would trigger mandatory incident reporting—making competent auditing a compliance violation.]]></description>
            <content:encoded><![CDATA[<p>Flock finally reacts to the vulnerabilities it has known about and failed to fix for nearly a full
year. Sort of. The company put out a press release today saying it “will launch a comprehensive
testing campaign to provide third-party evaluation of Flock’s technology as part of the company’s
continued commitment to security and risk management.” Unfortunately, rather than contributing to a
more secure environment, this audit is virtually guaranteed to bring Flock further out of compliance.</p>
<p>The announcement is, of course, almost entirely marketing gibberish; to the extent that there’s any
meat on its bones, this is it:</p>
<blockquote>
<p>Bishop Fox’s offensive security experts will engage in complex, multistage and multilayer
adversarial testing across all of Flock’s products, both hardware and software. The results and
any ensuing updates will be communicated transparently to reinforce confidence in Flock’s strong
security posture. — <a href="https://markets.businessinsider.com/news/stocks/flock-safety-engages-bishop-fox-to-set-the-industry-standard-in-cybersecurity-for-its-public-safety-platform-1035773201">Dumb title omitted</a>, Flock via GlobeNewswire, Feb 2, 2026</p>
</blockquote>
<p>The key phrase is “multistage and multilayer adversarial testing.” This suggests<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> they will
engage Bishop Fox for some good old-fashioned red teaming.</p>
<p>It would be good news. If this announcement passed the smell test.</p>
<h2>Why would Flock announce this to the world?</h2>
<p>For readers not familiar with the term, “red teaming” is industry shorthand for hiring people who
will attempt to break into your systems. It can include everything from physical entry (by breaking
into buildings), to social engineering, to “hacking” systems over the Internet.</p>
<p>This is an incredibly useful exercise for security teams. Red teams (and actual attackers) can test
vectors that employees typically can’t—for example, leaving USB sticks containing malware in company
parking lots, putting on a hi-viz vest and carrying a clipboard into the server room, or
sweet-talking Sam from HR into giving them an employee login.</p>
<p>If you want to test your everyday preparedness, announcing it to the world is not a good idea, for
obvious reasons.</p>
<p>Perhaps more importantly for a company like Flock, an announcement like this sets expectations:</p>
<blockquote>
<p>The results and any ensuing updates will be communicated transparently to reinforce confidence in
Flock’s strong security posture.</p>
</blockquote>
<p>A red team exercise at any organization, let alone one with a track record like Flock’s, is not a
one-shot third-party validation exercise. Testing and addressing vulnerabilities is a months-long
coordinated effort between senior management, in-house security staff, external consultants, and
engineering teams.</p>
<p>If done right, the result is not a report to be presented in a shareholder call; it’s a binder
documenting the work your management and engineering teams will be doing for the next six months.</p>
<p>And that’s just about the best-case scenario, which I do not expect for Flock.</p>
<p>Instead, Flock blasts out a press release with little to no context, creating unnecessary friction
between shareholders who simply want a stamp of approval and security teams who want meaningful,
long-term fixes.</p>
<p>Flock uses the language of success to set itself up to fail.</p>
<h2>The Bishop Fox Choice</h2>
<p>Bishop Fox is generally a well-regarded offensive security firm—the kind of company you hire when
you’re serious about finding vulnerabilities. But …</p>
<p>Late last year, I published “<a href="https://footnote4a.org/news/cyble-part4">Y Combinator funds both surveillance infrastructure and the machinery
to silence its critics</a>” which described some of the Y Combinator ties between
Flock and its alleged other cybersecurity partner, Cyble.</p>
<p>I say “alleged,” because in that post, I questioned how formal the relationship is, writing “I would
expect one of them to do a press release announcing a ‘strategic partnership.’” Here, Flock did not
choose Cyble. It chose Bishop Fox. And it put out a press release.</p>
<p>While the ties between the companies do not suggest the same level of intertwinement as between Flock
and Cyble, interesting overlaps remain.</p>
<p>Reddit co-founder Alexis Ohanian was Flock’s first investor while Reddit co-founder <a href="https://bishopfox.com/company">Steve Huffman
currently serves on the board of Bishop Fox</a>.</p>
<p>Chris Castaldo, Flock’s new CISO, worked at IronNet CyberSecurity before being hired at Flock. Don
Dixon, managing director of Forgepoint Capital, serves on the board of both IronNet and Bishop Fox.</p>
<p>Castaldo also worked with Will Lin—another managing director and founding member of ForgePoint
Capital<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup>: they co-founded the non-profit Security Tinkerers in 2018 and continue to collaborate
on it today.</p>
<p>The “follow the money” connection between Flock and Bishop Fox is not as obvious or direct as the
one between Flock and Cyble, but the close personal relationship Flock’s new CISO maintains with
managing directors and board members of a  “neutral third party” that could add or remove billions
from Flock’s valuation raises serious red flags.</p>
<p>We’ll see if Flock publicly acknowledges this appearance of a conflict at any point before the
“results” are in, or if we’re expected to take everything at face value.</p>
<h2>The impossible bind</h2>
<p>The CJIS Security Policy (CJISSECPOL), also name-dropped<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup> in the press release, creates an
inescapable problem for any “production” testing of Flock’s systems.</p>
<p>There is a commonly-used CJISSECPOL workaround for giving contractors temporary access to <abbr class="md-tooltip" data-tooltip="Criminal Justice Information">CJI</abbr>
without full vetting: a Flock employee “escorts” the contractors while they work. This avoids
fingerprinting, background checks, and the cascade of compliance certifications that would otherwise
be required from every agency customer in states without centralized contractor vetting.</p>
<p>The problem is that in an “escort” scenario, the escort is legally required to prevent Bishop Fox
from accessing unencrypted <abbr class="md-tooltip" data-tooltip="Criminal Justice Information">CJI</abbr>. CJISSECPOL § 5.1.1.5 is explicit: physical access must be
“controlled” and the escort must maintain “observation” to ensure the contractor cannot view
protected data.<sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup></p>
<p>As soon as Bishop Fox successfully discovers a vulnerability that exposes real data—which is, after
all, the entire point of red teaming—the escort has failed in their duties. The incident becomes
reportable under CJISSECPOL. CGAs must be notified, as well as the FBI, and mitigation plans must be
submitted.</p>
<p>Success equals failure. The very act of doing the security audit competently would trigger mandatory
incident reporting.</p>
<h2>Neither alternative works</h2>
<p>For Flock, as the defending “blue team,” there are two paths forward, and both lead nowhere good.</p>
<p><strong>Option 1: Test on a replica environment.</strong></p>
<p>There is a lot of evidence of Flock using development-specific code and keys in production and
vice-versa, suggesting poor logical separation and cross-environment contamination. If I had to make
a list of “organizations I would expect can roll out an accurate replica of their production
environment,” Flock would definitely not be on it.</p>
<p>Even assuming Flock could create an accurate replica <em>software</em> environment, if your penetration
testing is multilayer and includes physical security, you have to include the security of your
office and server buildings, as well as any parts of your network you’re leaving <a href="https://footnote4a.org/news/federal-insecurity">unattended on a
stick on the side of the road</a>.</p>
<p>And while a replica might yield valid results for a blue team interested in making improvements,
because we can’t verify the fidelity of the replica, it would invalidate a lot of the “third party”
claims that Flock raises in its press release. (Again, I ask: why announce it in a press release?)</p>
<p><strong>Option 2: Test in production.</strong></p>
<p>This creates the impossible bind described above. But even setting aside the escort paradox, testing
in production without the escort workaround would be worse.</p>
<p>Some states, through their CSAs, have centralized vetting for contractors. Many do not. For states
without centralized vetting, each Bishop Fox employee with access to unencrypted <abbr class="md-tooltip" data-tooltip="Criminal Justice Information">CJI</abbr> would have to
be fingerprinted, background checked, and certify their knowledge of, and agreement with,
CJISSECPOL to each Flock customer with an active CJIS security addendum.</p>
<p>To be compliant with CJISSECPOL, all governmental Flock customers in those states must independently
ensure this has happened. Failing to do so, even in a single jurisdiction, would bring all of
Flock’s customers—including those in states <em>with</em> centralized compliance—out of compliance the
moment Bishop Fox touches a live packet.</p>
<p>We already know <a href="https://footnote4a.org/news/dps-denmark">Flock sends data to Denmark</a> and <a href="https://footnote4a.org/news/overseas-data">the
Philippines</a>. The certifications I have received in open records requests did
not include these contractors.</p>
<p>Ultimately, it’s on local criminal justice agencies and their state CSAs—not Flock—to remain in
compliance with CJISSECPOL.</p>
<p>If Flock were to add another subcontractor to access its customers’ <abbr class="md-tooltip" data-tooltip="Criminal Justice Information">CJI</abbr> without obtaining necessary
authorizations, conducting the necessary background checks, and providing the required compliance
documentation, it would bring its agency customers even further out of compliance.</p>
<h2>We’ve tried nothing, and we’re all out of ideas</h2>
<p>Flock continues to sit on <a href="https://gainsec.com/2025/11/05/formalizing-my-flock-safety-security-research/">the report by GainSec</a>, which documents dozens of vulnerabilities
that were reported to Flock in February 2025 but, by all accounts, remain unfixed. It also continues
to ignore the unrelated issue from late 2025, where it <a href="https://nexanet.ai/blog/53-times-flocksafety-hardcoded-the-password-for-americas-surveillance-infrastructure">hardcoded passwords in
production</a>.</p>
<p>The red team should have no trouble finding and flagging these issues. Then we’ll have another
report for Flock to fail to act on.</p>
<p>In its press release, Flock writes that “[t]he results and any ensuing updates will be communicated
transparently to reinforce confidence in Flock’s strong security posture.”</p>
<p>Flock could start on that today by acknowledging and fixing the already-documented vulnerabilities
in its products.</p>
<p>Flock could also own up to all the security incidents it has experienced, from accidentally
disclosing a file with customer emails, to hardcoding passwords in roadside cameras. It could
transparently implement fixes, or even provide a schedule for these fixes.</p>
<p>The company could address the issues with compliance, which include failures to mitigate critical
security vulnerabilities within 15 days as CJISSECPOL requires, designing the system to disseminate
<abbr class="md-tooltip" data-tooltip="Criminal Justice Information">CJI</abbr> indiscriminately, and <a href="https://footnote4a.org/news/dupage-county-2">leaking entire murder investigations</a>.</p>
<p>Instead of falsely claiming “<a href="https://footnote4a.org/news/never-hacked-facts">we have never been hacked</a>” and <a href="https://footnote4a.org/news/secret-searches-part2">removing
accountability measures</a>, Flock could work with independent security
researchers, rather than try to get them to sign NDAs.</p>
<p>Flock could even work with CSAs and the FBI, which are authorized to audit Flock’s systems. After
several unanswered requests to the Iowa Department of Public Safety (Iowa’s <abbr class="md-tooltip" data-tooltip="CJIS Systems Agency">CSA</abbr>), in December 2025,
I even requested the FBI perform such an audit, citing incidents where Flock disseminated warrant
information from NCIC, and the <a href="https://footnote4a.org/news/dupage-county-2">157 pages of murder investigation</a> mentioned
earlier.<sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup></p>
<p>The company has not issued a single press release indicating it has done, or plans to do, any of
these things.</p>
<p>From inception, this announcement has all the hallmarks of compliance theater—perhaps producing a
meaningless report by an “independent” third party, before CJISSECPOL’s stricter “Supply Chain Risk
Management” controls come into full effect with version 6, is a way to avoid the Department of
Justice needing to wade into the mess Flock, local agencies, and CSAs have created.</p>
<p>Flock’s goal should be to improve its security posture, not to “reinforce confidence” in it. One is
security, the other is managing public perception—i.e., marketing.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>That said, we know Flock plays semantic games in its marketing and press releases. The
company likes to treat its customers like they’re opposing counsel in a lawsuit. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>It is somewhat unclear if Lin still holds his board position. Secondary sources make the
claim, but he is not listed on <a href="https://bishopfox.com/company">the company’s “meet the team”
page</a>. Alberto Yépez and Ernie Bio are still there to represent
his company, ForgePoint. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>See the previous footnote. Flock claims “compliance with CJIS Security Policy,” which is an
impossibility for a third-party vendor; the policy only applies to criminal justice agencies. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>CJISSECPOL § 5.1.1.5: “Physical access to information system facilities where <abbr class="md-tooltip" data-tooltip="Criminal Justice Information">CJI</abbr> is
processed, stored, or transmitted shall be controlled… Visitors shall be escorted at all times
and activities monitored.” The policy contemplates escorts as a control mechanism to <em>prevent</em>
unauthorized access, not to observe it happening. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>Additional documents about these requests will be published here in due time. <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>foia-transparency</category>
        </item>
        <item>
            <title><![CDATA[Disproportionate by Default: The Reason Behind the Reason Field]]></title>
            <link>https://footnote4a.org/news/search-reasons</link>
            <guid isPermaLink="false">https://footnote4a.org/news/search-reasons</guid>
            <pubDate>Mon, 26 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Police routinely retrieve 30-day location histories for minor infractions, welfare checks, and "stranger danger"—not because investigations require it, but because it is the default setting.]]></description>
            <content:encoded><![CDATA[<p>Last week, the <a href="http://haveibeenflocked.com">haveibeenflocked.com</a> system ingested its 100 millionth record of a Flock search. I’ve
been vocal about the lack of transparency and how widespread abuse appears to be, even based on the
limited information we have. But what if we were to ignore that? What if we look at the system and
pretend that it is used as intended? The logs tell a story that is perhaps even more disturbing:
police will examine your long-term location history for any reason or no reason at all.</p>
<h2>Location histories and the Fourth Amendment</h2>
<p>The most pertinent discussion, or lack thereof, can be found in the lower court’s holding in
<em>Carpenter v. United States</em>, which SCOTUS described as:</p>
<blockquote>
<p>The Court declines to say whether there is any sufficiently limited period of time “for which the
Government may obtain an individual’s historical [location information] free from Fourth Amendment
scrutiny.” But then it tells us that access to seven days’ worth of information does trigger
Fourth Amendment scrutiny […] Why seven days instead of ten or three or one? And in what
possible sense did the government “search” five days’ worth of location information it was never
even sent? We do not know. — Carpenter v. United States, 585 U.S. 296, 395–96, 138 S. Ct. 2206,
2266–67, 201 L. Ed. 2d 507 (2018) (internal citations omitted)</p>
</blockquote>
<p>There was clearly <em>some</em> concern at the Supreme Court and among the parties regarding the length of
the location history. The Supreme Court’s holding in <em>Carpenter</em> was narrow and it declined to
address the confusion, writing in a footnote that “[i]t is sufficient for our purposes today to hold
that accessing seven days of CSLI constitutes a Fourth Amendment search.”</p>
<p>Whether a cut-off exists under which retrieving location history data  would no longer be a Fourth
Amendment search, or where that cut-off would be, were not questions addressed by the Court, but in
<em>Carpenter</em>, seven days of location history was enough.</p>
<p>Although Flock downplays the completeness of its data and the general usefulness and accuracy of its
“critical tool” when it comes to defending it in the face of <em>Carpenter</em>, a federal court in Virginia
has already found that 176 Flock cameras in Norfolk, VA “plausibly violate” the Fourth Amendment.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>Courts have not yet addressed Flock’s actual network density, suspected to include <a href="https://footnote4a.org/news/network-size">more than a
quarter million cameras</a>.</p>
<h2>Disproportionate by Default</h2>
<p>Flock’s lookup tool, which is used for exact plate searches across the state- and nationwide
networks, offers users limited options for the length of the requested location history: 1 day, 7
days, or 30 days.</p>
<p>Its “search” tool, which can search for partial plates, vehicle characteristics, and use “freeform”
text queries, is not restricted in that way. It can do both longer and shorter searches.</p>
<p>It is unclear whether there is a default setting for either, what the default setting is if there is
one, or who would configure the default setting. I do not recall ever seeing an ALPR policy or city
council minutes that discuss this.</p>
<p>Examining per-state data for lookups<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> yields the following results:</p>
<div class="chart-placeholder" data-chart="state-mode-distribution"></div>
<p>Considering this chart, a per-state or per-organization default setting seems unlikely, however,
the uniformity of location history lengths has changed over time:</p>
<div class="chart-placeholder" data-chart="uniformity-area"></div>
<div class="chart-placeholder" data-chart="uniformity-stats"></div>
<p>The high uniformity suggests a system-wide default that users are accepting. The sudden change in
mid-2025, where users begin choosing different lengths for location history, may be part of the same
systemwide changes that <a href="https://footnote4a.org/news/august-2025-drop">appeared in Santa Cruz in August</a>.</p>
<p>The suddenness of the shift in uniformity suggests that Flock switched to a 7-day default around
that time and users are less accepting of that default than they were of the earlier, 30-day
default.</p>
<p>Regardless of any default, individual users still passively or actively choose to retrieve these
histories without much apparent concern for proportionality. A seven- or thirty-day location history
because an officer can’t be bothered to select a more appropriate menu option strays far from the
reasonableness the Fourth Amendment demands.</p>
<p>Finally, for all searches in our database that have timeframe information, the average length of location
histories retrieved is 18 days, 5 hours, 39 minutes. That includes “search” queries as well as “lookup”
and other types of queries.</p>
<h2>Before the Dropdown</h2>
<p>But why are users pulling these long-term histories? “Every search must be accompanied by a reason.”
Before switching to dropdowns in January 2026, Flock users were free to enter their own reasons.
Although they often did not—beyond “inv” or “sus”—the reasons that were entered do provide a glimpse
into what might trigger long-term lookups of location histories.</p>
<ul>
<li><em>Suspicious Person on Campus</em>: 30 days</li>
<li><em>stranger danger</em>: 30 days</li>
<li><em>Suspicious Auto (bullet holes)</em>: 30 days<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup></li>
<li><em>fishing violation</em>: 33 days, 1 hour</li>
<li><em><abbr class="md-tooltip" data-tooltip="Hit and run">h&r</abbr> vehicle</em>: 217 days</li>
<li><em>lowes theft</em>: 366 days</li>
</ul>
<p>It’s hard to come up with a reason why, or how this would contribute to the investigations described.</p>
<h2>Dropdown Reasons</h2>
<p>Maybe Flock’s new <a href="https://footnote4a.org/dropdown-reasons">reason dropdown</a> will live up to the marketing hype and
provide more transparency. To be clear: these are the reasons that someone, somewhere, found
acceptable enough as a reason for location history retrieval.</p>
<h3>Traffic Infractions and DUIs</h3>
<p>Through the dropdown, the <a href="https://footnote4a.org/pd/3158-texas-department-of-public-safety/audit?q=Traffic%20Infraction">Texas Department of Public Safety</a> states it frequently uses the
system for “Traffic Infraction - Criminal Justice Purpose.”</p>
<div class="chart-placeholder" data-chart="traffic-history-bar"></div>
<p>Although we can’t know what “Traffic Infraction - Criminal Justice Purpose” actually <em>means</em>, we
know that most traffic infractions are short-lived; where someone had lunch last week has little
probative value in cases where someone failed to stop at a stop sign.</p>
<p>Regardless, the vast majority of Texas DPS’s traffic-related location history retrievals exceeded
the seven-day threshold the Supreme Court found implicated the Fourth Amendment in <em>Carpenter</em>.</p>
<p>DPS pulled histories exceeding 250 days in several cases.</p>
<p>The <a href="https://footnote4a.org/pd/196-california-highway-patrol/audit?q=DUI">California Highway Patrol</a> similarly uses Flock for DUI investigations.</p>
<div class="chart-placeholder" data-chart="dui-history-bar"></div>
<p>California, of course, has much stricter controls on ALPRs and the Ninth Circuit tends to be more
privacy-friendly than its counterparts elsewhere in the country. This may explain why CHP’s use
appears much more restrained than Texas’.</p>
<p>But that restraint is relative—CHP still retrieved location histories for seven or more days in more
than half of the DUI investigations where it used Flock. What evidentiary value this could possibly
have is anyone’s guess.</p>
<h3>Welfare Checks</h3>
<p>Perhaps even more concerning is the <a href="https://footnote4a.org/pd/1278-harris-county-sheriffs-office/audit?q=welfare">Harris County, Texas, Sheriff’s Office</a> use of Flock
for welfare checks.</p>
<div class="chart-placeholder" data-chart="welfare-history-bar"></div>
<p>Welfare checks are not criminal investigations, and they are not generally triggered by accusations
of any crime. They are also not the same as missing persons cases. They can range from neighborly
concern to someone actively threatening suicide. In these cases, there may be a clear defense for
the legality of retrieving a person’s <em>current</em> location to prevent harm, but the government does
not need to know where they’ve previously been.</p>
<p>Yet here too, for more than half of “Welfare Checks” the Harris County, Texas, Sheriff’s Office
retrieves location histories of seven days or more: a length the Supreme Court found sufficient to
trigger the Fourth Amendment.</p>
<p>And they’re doing it in cases where there is no criminal investigation, and no evidence of a crime.</p>
<h2>The Reason Behind the Reason</h2>
<p>The implications of some of these long-term searches are concerning.</p>
<p>While a DUI suspect’s long-term location history seems like a mostly pointless violation of rights,
what possible conclusion could someone draw from a shoplifter’s vehicle’s location a year ago? How
does knowing where the “suspicious person on campus” has been decrease the suspiciousness of his
actions today?</p>
<p>A 30-day history will tell you at a glance the general area where a person lives and works. That
reveals information about their socio-economic status and, in many cases to a degree of statistical
certainty, their race. Maybe the reasoning is that a person who lives a wealthy suburb is less
“suspicious” when they’re walking around campus, while someone from the wrong side of the tracks
presents more “stranger danger.”</p>
<p>Whether it’s laziness or active profiling, the system is designed to make disproportionate
surveillance the path of least resistance. Flock could have defaulted to 1 day. They could have
required more justification for longer histories. Instead, they built a system where retrieving a
month of someone’s movements requires less thought than ordering a cup of coffee.</p>
<p>The Fourth Amendment doesn’t distinguish between malice and indifference. Neither should we.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>The <em>Schmidt v. Norfolk</em> case is ongoing; Flock argues that its network doesn’t provide
actual location histories and is attempting to distinguish it from arguably more accurate
cell-tower dumps. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>This chart shows the most common location history length for organizations, based on
organizations that have performed at least 1,000 searches, for states with more than 10
matching organizations. Likely data issues (not conforming to the 1, 7, 30 rule) were discarded. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>Even if this isn’t a high schooler with bullethole stickers, shooting your own car is not
illegal, nor is being shot at. This Flock user spotted what he believed could be the victim of a
crime and flagged the victim as “suspicious” tells a story about modern policing. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>audit-log-analysis</category>
        </item>
        <item>
            <title><![CDATA[Public Policy vs. Private Sharing: California Rebuilds the National Network]]></title>
            <link>https://footnote4a.org/news/shadow-network</link>
            <guid isPermaLink="false">https://footnote4a.org/news/shadow-network</guid>
            <pubDate>Thu, 22 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[With states enacting bans on interstate dissemination of ALPR data and the public's interest in oversight and accountability, Flock and police are getting creative. Flock built the tools to rebuild what state legislatures dismantled—one checkbox at a time.]]></description>
            <content:encoded><![CDATA[<p>When a Flock user performs a search, that search is logged in accounts belonging to the agencies
that originally funded the cameras.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> It ends up in “Network Audit” logs, some of which
are published on this website. This is true whether it is a “<abbr class="md-tooltip" data-tooltip="Total Analytics Law Officers Network: Flock&#39;s embarrassingly tacticool name for its nationwide/statewide data brokerage network.">TALON</abbr>” (nationwide or statewide)
lookup, or a “1:1” search. As states have tightened laws, the “1:1” numbers have been increasing,
suggesting that a shadow network is being created to evade privacy laws and public oversight.</p>
<p><img src="https://footnote4a.org/blog/shadow-network/sharing.jpg" alt="Automatic sharing options in Flock software"></p>
<p>The screenshot is from a <a href="https://www.youtube.com/watch?v=S34n0_TBFgo">Flock training video</a> which shows a Flock user interface for
automatic data sharing. The video was <a href="https://data.aclum.org/2025/10/07/flock-gives-law-enforcement-all-over-the-country-access-to-your-location/">posted by ACLU of Massachusetts</a> in October 2025, but
various dates in the video suggest it was recorded in May 2024.</p>
<h2>California’s Workaround</h2>
<div class="chart-placeholder" data-chart="shadow-network-california"></div>
<p>After Flock disabled the “nationwide network” for its California customers “1:1” sharing exploded.
Rather than—or more likely, in addition to—switching to the statewide network, agencies in
California increased the number of partner networks they added—from fewer than 7 new partnerships per
week on average to more than 40.</p>
<p>When searches are done through a 1:1 sharing connection they are only logged in the originating
agency’s “Organization Audit” and in the receiving agency’s “Network Audit.” This is unlike national
searches, which are broadcast to the world and will almost certainly make their way into someone’s
open records request. Agencies aren’t limited to actually <em>performing</em> 1:1 searches. They can trawl
through data from all of their 1:1 connections seamlessly.</p>
<p>This leads to situations like those in <a href="https://transparency.flocksafety.com/pittsboro-in-pd">Pittsboro, IN</a>, where the agency entered into 3,968
partner agreements for a system it only used 17 times in the last 30 days.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> A
slightly-outdated <a href="https://footnote4a.org/sharing">visualization of the 1:1 sharing network</a> is available.</p>
<p>The data for this is hard to come by. Uncertainties persist due to <a href="https://footnote4a.org/news/august-2025-drop">what are presumably major data
issues</a> in Flock’s log files, as well as seemingly arbitrary redaction of
the <code>total_devices_searched</code> and/or <code>total_networks_searched</code> columns both by Flock and agencies.</p>
<p>The available data does, however, support the idea that Flock and police have been building a shadow
network, and that some restricted agencies, like those in California, have been using it.</p>
<p>The trend is not explained by Flock growing its customer base, or the overall number of networks. In
fact, nationally <a href="https://footnote4a.org/statistics/weekly?metric=networks">the number of networks appears to be stagnating</a>.<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup></p>
<h2>The Data Problem</h2>
<div class="chart-placeholder" data-chart="shadow-network-dominant-size"></div>
<p>The data must be interpreted with the caveat that Flock’s audit logs appear to be extremely unreliable.</p>
<p>We’ve seen the <a href="https://footnote4a.org/news/august-2025-drop">search inversion in August 2025</a> and the accompanying drop
in log entries. Examining counts more broadly shows even more bizarre outliers, and inexplicable
patterns.</p>
<p>The chart above shows the most popular (approximate) network pool size for “search” queries in three
populous states. While Illinois and California at least appear plausible, the same can’t be said for
Texas’ odd saw-pattern; I can see no plausible reason why agencies would suddenly search 50% fewer
networks for a week.</p>
<p>There is no evidence that these anomalies have bothered auditors in any way, or that any questions
have been asked. Flock certainly has not addressed it in a blog post or customer update.</p>
<h2>The Telltale Ratios</h2>
<p>Another piece of the puzzle that suggests this workaround is in active use is usage patterns.</p>
<div class="chart-placeholder" data-chart="shadow-network-sync-boxplot"></div>
<p>The chart shows the proportion of queries made through 1:1 search connections versus <abbr class="md-tooltip" data-tooltip="Total Analytics Law Officers Network: Flock&#39;s embarrassingly tacticool name for its nationwide/statewide data brokerage network.">TALON</abbr> (the
nationwide network). California agencies use 1:1 searches for 31% of their queries—three times the
rate of unrestricted states like Texas (11%) or Arizona (3%). Minnesota and Virginia, which have
also enacted restrictions on ALPR, show similarly elevated rates. This pattern is consistent with
restricted agencies routing queries through 1:1 partnerships to bypass network limitations.</p>
<p>The scale of some agencies’ 1:1 networks is staggering. We have seen 358 agencies in California do
searches on (a median of) 449 networks. These numbers seem realistic in the context of a national
estimate of ~5,000–6,000 agencies.</p>
<div class="chart-placeholder" data-chart="shadow-network-ca-agencies"></div>
<p>Yet El Cajon PD searches 3,584 networks through 1:1 connections—ten times the number of in-state
agencies. The California Highway Patrol searches 2,181, and the Riverside County District Attorney
searches 2,896.</p>
<p>These outliers use a shadow network reaching 60–95% of <abbr class="md-tooltip" data-tooltip="Total Analytics Law Officers Network: Flock&#39;s embarrassingly tacticool name for its nationwide/statewide data brokerage network.">TALON</abbr>’s nationwide coverage, all while
technically using “bilateral” sharing agreements.</p>
<h2>Secrets and Silence</h2>
<p>It’s important to note at this stage that although these 1:1 agreements are often understood to be
reciprocal in nature, it is unclear whether they in fact are. <a href="https://jsis.washington.edu/humanrights/2025/10/21/leaving-the-door-wide-open/">Washington University research</a>
notes that the “shifting and sometimes inaccurate statements made by Flock about its product’s
sharing features” contribute to this confusion.</p>
<p>To further frustrate analysis, Flock does not make its product documentation available to the
public, and agencies do not generally release it responsive to public records requests. It is
therefore unclear if the restrictions seen in the (presumptive) May 2024 video still apply, or if,
in 2026, agencies can automatically accept requests from anyone, anywhere.</p>
<p>Still, while the exact scope and mechanism remain unknown, the available information does
demonstrate the existence of a shadow network, powered by some form of “auto-accept” or similar
feature.</p>
<p>California agencies are not, on average, hammering out between six and forty new agreements in any
given week. Going by recent public records responses, agencies are not exchanging emails about these
partnerships, let alone validating policies are in place. It has all the hallmarks of a checkbox.</p>
<p>That checkbox appears to be a “set and forget.” Nothing suggests that administrators are notified
when a request is auto-accepted. The <a href="https://jsis.washington.edu/humanrights/2025/10/21/leaving-the-door-wide-open/">Washington University report</a> highlights that many police
chiefs were entirely unaware that third parties had access until notified by the researchers, who
reviewed the logs.</p>
<p>Flock’s CEO Langley told us that “it is a local decision. Not my decision, and not Flock’s decision.”</p>
<p>What he built, buoyed by the FBI’s <a href="https://footnote4a.org/news/fbi-investigation">unsubtle threat of retaliation for complying with public records
requests</a>, does create local decision-makers—ones who’ve decided that
laws are optional and silence is policy.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>This is awkward phrasing for a reason: Flock owns and controls the cameras;
when talking about “agencies’ cameras” or “the city’s data” it’s shorthand for the legal reality
that <a href="https://footnote4a.org/news/trojan-contracts">Flock customers have no ownership stake in, or control over, either the devices or the
data</a>. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Check out <a href="https://eyesonflock.com/">EyesOnFlock</a> and sort by “Orgs shared.” <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>Disable the “max” line for easier viewing. That outlier is discussed in <a href="https://footnote4a.org/news/network-size">another post</a>. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>audit-log-analysis</category>
        </item>
        <item>
            <title><![CDATA[FBI Circulates Bulletin: Keep Flock Searches Vague, Punish Transparency]]></title>
            <link>https://footnote4a.org/news/fbi-investigation</link>
            <guid isPermaLink="false">https://footnote4a.org/news/fbi-investigation</guid>
            <pubDate>Sat, 17 Jan 2026 09:00:00 GMT</pubDate>
            <description><![CDATA[A Houston HIDTA bulletin, forwarded by the FBI to its intelligence community, instructs Flock users to enter vague search reasons and exclude agencies that comply with public records laws.]]></description>
            <content:encoded><![CDATA[<p>Late last year, <a href="https://footnote4a.org/news/cyble-part4">shortly before Flock started filing takedown notices</a>, the
Houston Investigative Support Center and Investigative Research Team put together an “Officer Safety
Situational Awareness Bulletin” about this project, recommending Flock users keep the reasons they
enter as vague as possible (“e.g., ‘Investigation’”). The FBI’s Gang division in Atlanta forwarded
it to the FBI’s broader “intelligence community.”</p>
<p>The FBI agent provided a summary of the bulletin in his email (emphasis added):</p>
<blockquote>
<p>The website lists the total number of searches by an officer, when those searches were conducted,
case numbers, the officer’s work schedule, how long they have been employed by the agency, and
partial personal identifying information. This poses a significant officer safety risk to law
enforcement personnel because suspects can determine if they are the target of a criminal
investigation and potentially retaliate against law enforcement and/or those cooperating with law
enforcement. <strong>Flock has committed to removing officer usernames from future audits.</strong></p>
</blockquote>
<p>@<a href="https://footnote4a.org/blog/fbi-investigation/fbi-email_Redacted2.pdf" class="collapsible">December 11, 2025 email from FBI</a>
@<a href="https://footnote4a.org/blog/fbi-investigation/bulletin.pdf" class="collapsible">Houston <abbr class="md-tooltip" data-tooltip="High Intensity Drug Trafficking Area">HIDTA</abbr> Officer Safety Situational Awareness Bulletin December 2025</a></p>
<div class="markdown-alert markdown-alert-note">
<p class="markdown-alert-title">Note</p>
<p><abbr class="md-tooltip" data-tooltip="Personally Identifying Information">PII</abbr> was originally included in this email release, but was redacted before publication here. The
record was released responsive to a public records request by <a href="https://www.sassisouth.org/">Southerners Against Surveillance
Systems &amp; Infrastructure</a> and <a href="https://www.lucyparsonslabs.com/">Lucy Parsons Labs</a>.</p>
</div>
<h2>Under Federal Pressure</h2>
<p>This email was sent shortly after <a href="https://footnote4a.org/news/colwell-files">Flock’s email blast announcing reduced audit
capabilities</a> (“Flock has committed to removing officer usernames from future
audits”). The agent who sent the email is based in Atlanta (as is Flock’s HQ). Flock used the same
“officer safety” language.</p>
<p>Flock’s <a href="https://footnote4a.org/news/secret-searches-part2">removal of critical auditing capabilities</a> was clearly done in
coordination with the FBI.</p>
<p>The FBI-endorsed bulletin recommends that, in configuring data sharing, agencies “exclude the
states/agencies that release their audit logs.”</p>
<p>Information exchange happens on an ongoing reciprocal basis; the proposal is, in effect, to reduce
the operational capabilities of the Flock system for states with effective open record laws, and
specifically for agencies in compliance with those laws.</p>
<p>The FBI encourages agencies to violate the law by quietly threatening retaliation against those who
don’t.</p>
<p>Follow the law, lose network access.</p>
<h2>The Good Recommendations</h2>
<blockquote>
<p>Recipients of this bulletin should ensure that their agency Flock Administrators check that the
agency Flock settings have limited searches to sharing within state only or exclude the
states/agencies that release their audit logs. … Flock users should also limit their searches to
“My Network” or draw a geofence around the area they wish to search. This will mitigate the risk
of information being released by an outside agency that has different criteria as to what is
redacted when responding to FOIA requests.</p>
</blockquote>
<p>Agreed. Police should not default to pulling nationwide location histories for reasons like
“graffiti”, “trespassing,” or “expired tag.” They should not be pulling <em>any</em> location history, of
course, but current scopes are especially hard to justify as serving a legitimate investigative
purpose.</p>
<p>The nationwide lookup is often cited as a “why we need Flock.” Apparently, when faced with a risk of
oversight, that need evaporates. Police seem to prefer less intelligence over more accountability.</p>
<p>Regardless, although the reasons for wanting to reduce the scope and breadth of warrantless searches
differ, we can at least agree this outcome is an improvement.</p>
<p>To further improve its recommendation, the FBI might consider suggesting following its own security
policy. If the data and audit logs Flock stores are in fact <abbr class="md-tooltip" data-tooltip="Criminal Justice Information">CJI</abbr>—as Flock and agencies claim whenever
convenient—access and dissemination would be strictly limited to those with prior approval and a
particularized “need to know.”</p>
<p>That does not include <a href="http://haveibeenflocked.com">haveibeenflocked.com</a>. It also does not include Flock or random users on the
nationwide network (i.e. “paying customers Flock says are probably cool.”)</p>
<h2>The Bad Recommendations</h2>
<blockquote>
<p>Flock Administrators/users should ensure that the reason for the query be as vague as permissible
(e.g., “Investigation”).</p>
</blockquote>
<p>This is one to take to your city council.</p>
<p>Elected officials have been promised that agencies have the ability to see the reasons for a search.
The FBI is now telling agencies across the country not to enter meaningful reasons.</p>
<p>We’ve long known that <a href="https://footnote4a.org/reason-cloud">entered reasons are borderline meaningless</a>, but now, in addition
to <a href="https://footnote4a.org/news/secret-searches-part2">Flock’s new anti-transparency measures</a>, it is federal policy.</p>
<h2>The Ugly Recommendation</h2>
<blockquote>
<p>[A]gency Flock Administrators should coordinate with their respective Legal Departments to ensure
that law enforcement sensitive information is redacted prior to releasing information.</p>
</blockquote>
<p>The information on this website is lawfully obtained via public records. This isn’t in dispute: even
after filing its takedown requests stating the opposite, <a href="https://footnote4a.org/news/cyble-part4">Flock admits as much</a>.</p>
<p>Additionally, there is a basic legal reality that <a href="https://footnote4a.org/news/404-eff-plates">license plates are not categorically exempt from
open records requests</a>. If Flock (a private corporation) can have access to
the data, so can you.</p>
<p>Houston <abbr class="md-tooltip" data-tooltip="High Intensity Drug Trafficking Area">HIDTA</abbr> appears to agree. Its recommendation is <em>not</em> “you should never release license
plates.” Its phrasing signals an awareness that license plates are not categorically “law
enforcement sensitive” or confidential for the purpose of public records requests.</p>
<p>At no point does the bulletin suggest that logs were leaked or improperly redacted.</p>
<p>Instead, the bulletin recommends agencies “coordinate with their legal departments.” On this too, we
can agree, but for different reasons. The question posed to lawyers should be if sending “law
enforcement sensitive” information to an unregulated private company to be disseminated through a
“nationwide sharing” network where tens (if not hundreds) of thousands of people have access, would
violate state law and federal regulations.</p>
<p>The question should not be the one implied—how agencies can get away with disclosing “sensitive”
information to a group of individuals managed exclusively by Flock, while keeping it hidden from
“activists” and “self-styled privacy advocates.”</p>
<h2>The “Self-Styled Advocates”</h2>
<blockquote>
<p>A group of self-styled privacy advocates have filed a series of Freedom of Information Act (FOIA)
requests with law enforcement agencies around the country to obtain agency Flock audit logs.</p>
</blockquote>
<p>In context, “self-styled” is a deliberate pejorative. It is spook-speak used to delegitimize. It
implies those seeking accountability aren’t experts or journalists, but meddling hobbyists.</p>
<p>Police use the language of counter-terrorism to describe citizens exercising a statutory legal
right. In their framing, a citizen with a PDF reader is a “threat actor,” and a public record is a
“vulnerability.”</p>
<p>At the same time, everything, including the actual surveillance data can be disclosed without
restriction to Flock, everyone on the national network (as managed by Flock), Flock’s
subcontractors, Flock’s <a href="https://footnote4a.org/news/overseas-data">gig-workers in the Phillipines</a>, and the <a href="https://footnote4a.org/news/dps-denmark">Danish
corporation Flock uses to record user sessions</a>.</p>
<p>We’re coming up on <a href="https://footnote4a.org/news/federal-insecurity">a year since several P1 <abbr class="md-tooltip" data-tooltip="Criminal Justice Information System Security Policy">CJISSECPOL</abbr> violations</a> were
reported to Flock. Flock still hasn’t announced a patch. A <a href="https://nexanet.ai/blog/53-times-flocksafety-hardcoded-the-password-for-americas-surveillance-infrastructure">vulnerability exposing real-time
locations for officers</a> went unfixed for months. If we are to take the FBI at its word,
these vulnerabilities pose less of a threat to officers than public accountability.</p>
<p>Maybe the actual security problem here is the government contracting out the creation of a massive
surveillance database based on a company’s claim that it has a “<abbr class="md-tooltip" data-tooltip="Criminal Justice Information System">CJIS</abbr> ACE Compliance Seal” (provided
by Diverse Computing, Inc., of Tallahassee, FL).</p>
<p>Regardless, I want to assure the FBI that there is no “group of self-styled privacy advocates.” A
handful of individuals have sent me audit logs, and I’ve pulled a few directly off Muckrock. The
persistent belief that this project publishes information from many sources is mistaken.</p>
<p>Although as of right now there are 93M records in the database, they cover a limited time period and
were sourced from a handful of releases. At the bottom of the <a href="https://footnote4a.org/statistics/daily">daily statistics
pages</a> you can see the number of sources that cover a given month, and the number
of search records for that month.</p>
<p>In months with more sources we see significantly more searches logged, yet out of the ~6,000 or so
agencies using the system, we have logs from maybe a dozen for any given month.</p>
<p>This information is continuously being disseminated to Flock and by Flock. Anyone with access to the
Flock system can get more complete, and more accurate, logs than this project has.</p>
<p>If your position is that “a group of self-styled privacy advocates”—which is really one developer in
rural Iowa and the folks who have sent him emails—can use inaccurate, incomplete data to derive so
much information that it “poses a significant officer safety risk,” what do you think a Flock
employee or contractor—or someone exploiting documented, unpatched security vulnerabilities—could do
with realtime access to accurate information?</p>
<p>Agencies are right to be worried. They’re wrong to worry about the messenger while ignoring the problem.</p>
<h2>What You Can Do</h2>
<h3>Get Answers from Public Officials</h3>
<ul>
<li>Does your PD follow the FBI’s recommendation to enter vague search reasons like “Investigation,”
or does it require specific reasons and case numbers for every query?</li>
<li>Has your PD stopped searching data from jurisdictions that comply with public records laws?</li>
<li>Since Flock has removed officer usernames from audit logs, how does your city verify that
individual officers aren’t using this system for personal or other impermissible reasons?</li>
<li>Do Flock or the FBI have the right to dictate which public records your city is allowed to release?</li>
</ul>
<h3>Get Answers from the Public Record</h3>
<p>Even without the logs, it’s worth finding out if your city complies with open records laws, if only
so the FBI will continue to recommend that your city be excluded from future searches.</p>
<p>The FBI suggesting consequences for complying with transparency laws underscores the need to remind
these self-appointed surveillance authorities that, in free societies, we don’t treat the rule of
law as optional for police.</p>
<h3>Tired of Self-Styling? Get Self-Certified</h3>
<p><a href="https://footnote4a.org/about/audit-logs">Demanding transparency</a>, speaking at <a href="https://alpr.watch/">local meetings</a>,
and writing <a href="https://www.commoncause.org/find-your-representative/">your representatives</a> is a lot of
work. You may want to be more than just a self-styled privacy advocate.</p>
<p>That’s why <a href="http://haveibeenflocked.com">haveibeenflocked.com</a> is offering you the opportunity to become a Certified Privacy
Advocate. If the government is going to pathologize transparency, you might as well have the
credentials to back it up.</p>
<p>This certificate is every bit as legitimate as <a href="https://footnote4a.org/news/federal-insecurity">a commercial <abbr class="md-tooltip" data-tooltip="Criminal Justice Information System">CJIS</abbr> seal</a>
and it may even fit in a frame if you print it correctly.</p>
<p><strong><a href="https://ko-fi.com/s/b75c5f1286">Get certified today</a>!</strong></p>
<p>Pay what you want to print as many certificates as you like, or don’t pay at all. If you frame it
and hang it anywhere good, <a href="mailto:humans@haveibeenflocked.com">send me a picture</a>.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>audit-log-analysis</category>
        </item>
        <item>
            <title><![CDATA[Florida Sheriff Uses Flock as Lie Detector, Asks County to Suppress Discussion]]></title>
            <link>https://footnote4a.org/news/fl-hernando-sheriff</link>
            <guid isPermaLink="false">https://footnote4a.org/news/fl-hernando-sheriff</guid>
            <pubDate>Thu, 15 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Hernando County's sheriff wants commissioners to help "minimize public discussion" of ALPR surveillance—and won't explain why in writing. Buried in his email is an admission he uses Flock data to dismiss witness testimony.]]></description>
            <content:encoded><![CDATA[<p>Local news outlet <a href="https://www.rnews.news/">R News</a> recently reported that <a href="https://www.rnews.news/story/2026/01/06/news/sheriffs-email-to-bocc-leaked-to-r-news-warned-commissioners-of-felony-penalties-over-flock-program/1105.html">Hernando County,
Florida’s sheriff asked the county to suppress public discourse on ALPRs</a>.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> In an email, the
sheriff asked commissioners for their “help in minimizing the public discussion on this topic.”
Regarding why, he wrote, “I do not want to go into details in writing, but I can give specific examples
if you would like to set up a meeting.”</p>
<p>Although the obvious headline in that debacle is the attempt to suppress public discussion and the
outright rejection of transparency, another part of the sheriff’s email is perhaps even more
disturbing:</p>
<blockquote>
<p>The technology has also allowed us to conduct truth verification on victim and witness statements,
allowing us to determine very quickly that one or more victim or witness was giving us false
information about what actually occurred. This keeps us from wasting valuable resources on chasing
false leads or, worse yet, investigating crimes that never occurred. — Sheriff Al Nienhuis in his
March, 2024 email to Hernando County Board of County Commissioners.</p>
</blockquote>
<p>The sheriff suggests he is willing to dismiss cases and leads based on information from Flock.</p>
<p>Does that mean he will not investigate when a citizen reports a vehicle is involved in a crime, but
Flock didn’t detect it? Will he dismiss valid witness statements when a plate is misread? When a bug
in the Flock software doesn’t register it?</p>
<p>We have no idea how accurate Flock’s technology is exactly. That’s both “for obvious reasons” and
because it is being used without oversight or external audits. Governments will spend millions on
these contracts without asking the question. Still, all technology is fallible, and we know Flock
neither contractually guarantees any level of accuracy, nor permits validation of accuracy.</p>
<p>Flock is not contractually obligated to disclose information about inaccuracies, outages, or errors.
It is negatively incentivized to do so; its customers don’t like hearing results are inaccurate,
they prefer to assume they are.</p>
<p>The idea that a sheriff would use the system for “truth verification” and to direct resources should
be deeply disturbing to anyone who values the integrity of criminal investigations.</p>
<p>A search result proves nothing. A lack of search results proves nothing. It’s Flock making an
unverified, and unverifiable, claim on the basis of a <a href="https://footnote4a.org/news/federal-insecurity">compromised system</a>.</p>
<p>Courts and police should treat it that way.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Hernando County is on Florida’s gulf coast, north of Tampa. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>audit-log-analysis</category>
        </item>
        <item>
            <title><![CDATA[Sunlight for the Surveillers: Why I Publish Audit Logs]]></title>
            <link>https://footnote4a.org/news/404-eff-plates</link>
            <guid isPermaLink="false">https://footnote4a.org/news/404-eff-plates</guid>
            <pubDate>Tue, 13 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Unredacted audit logs aren't a leak—they're the only functional check on surveillance abuse]]></description>
            <content:encoded><![CDATA[<p>Last Thursday, the Joplin Police Department announced an officer “is no longer employed by the City
of Joplin” after an investigation into suspected stalking via Flock’s license plate reader system.</p>
<p>The department didn’t discover this. Citizens did—by reading audit logs that <a href="http://haveibeenflocked.com">haveibeenflocked.com</a>
published, <a href="https://deflockjoplin.today/posts/2026-01-08-JPD-Audit.html">finding patterns that fourteen months of agency oversight had missed</a>, and
reporting them.</p>
<p>@<a href="https://footnote4a.org/blog/404-eff-plates/joplin.pdf" class="collapsible">Joplin, MO Statement</a></p>
<p>Today, <a href="https://www.404media.co/police-unmask-millions-of-surveillance-targets-because-of-flock-redaction-error/">404 Media ran an article</a> about this site and Flock’s takedown attempts. The
reporting is accurate. But both 404 Media and the EFF frame unredacted license plates as “leaked” or
“missed redactions.”</p>
<p>They’re wrong. The plates are the point.</p>
<h2>The legal reality</h2>
<p>Flock’s entire business model depends on license plates being unprotected information. If plates
were regulated like SSNs or medical records, Flock couldn’t operate—collection would require
warrants, sharing would require consent, and the nationwide dragnet would be illegal.</p>
<p>Flock chose this legal regime. They benefit from it every time a camera captures a plate without a
warrant, every time that data flows to thousands of agencies without restriction, every time a cop
searches the network without probable cause.</p>
<p>But that same legal framework means audit logs are public records.</p>
<p><a href="https://footnote4a.org/news/states-with-plates">As I’ve documented</a>, agencies have no lawful basis for redacting plates
precisely <em>because</em> plates aren’t protected information. You can’t claim data is too sensitive for
public records while simultaneously arguing it’s not sensitive enough to require a warrant.</p>
<p>Flock wants regulatory immunity <em>and</em> operational secrecy. That’s not a coherent legal position—it’s
lobbying.</p>
<p>This legal vacuum enables the abuse we’ve seen in <a href="https://footnote4a.org/news/ga-isuse">Georgia</a>, <a href="https://www.kansas.com/news/politics-government/article291059560.html">Kansas</a>,
<a href="https://boulderreportinglab.org/2025/08/19/until-recently-boulder-shared-license-plate-data-on-a-national-network-accessed-by-ice/">Colorado</a>, and now Joplin. It also makes unredacted audit logs the only functional check on
that abuse.</p>
<h2>Where I part with the EFF</h2>
<p>The EFF has done—and continues to do—important work. But on this, we disagree.</p>
<p>Their position treats plate exposure as a privacy harm to be minimized. Mine treats it as the
precondition for accountability. As long as Flock can collect this information without restriction,
the public must be able to see how it’s used—including who searched whom, and when.</p>
<p>Redacting audit logs doesn’t protect the surveilled. It protects the surveillers.</p>
<p>As long as Flock can have the information, you should too.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>quick-takes</category>
        </item>
        <item>
            <title><![CDATA[Flock's New Pitch: Surveillance or Serial Killers]]></title>
            <link>https://footnote4a.org/news/surveillance-or-serial-killers</link>
            <guid isPermaLink="false">https://footnote4a.org/news/surveillance-or-serial-killers</guid>
            <pubDate>Fri, 09 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[A TV ad, a recycled op-ed, and the quiet admission that guardrails don't actually work.]]></description>
            <content:encoded><![CDATA[<p>We’ve seen some unhinged messaging from Flock in the past few weeks, including
the email to Staunton, VA in which Flock’s CEO, Garrett Langley, told police
that they’re under attack from “<a href="https://footnote4a.org/news/staunton-attack">activist groups who want to defund the police, weaken
public safety, and normalize lawlessness</a>.” Flock seems to have
taken the brakes off its paranoid insanity with TV ads and reposted op-eds.</p>
<p>Let’s start with the TV-ad. A <a href="https://deflock.me">DeFlock</a> Discord user posted the following
screenshots, saying an ad showed on his Smart TV to tell him “We’re all lucky other cities in
Massachusetts haven’t followed Cambridge’s lead in removing these lifesaving devices, else a serial
killer would get you!”</p>
<div class="grid grid-cols-2">
    <img alt="TV showing 'We're all pretty lucky, though, that other cities in'" src="https://footnote4a.org/blog/surveillance-or-serial-killers/tv-ad-2.jpg">
    <img alt="TV showing 'haven't followed Cambridge's lead, or else a serial killer'" src="https://footnote4a.org/blog/surveillance-or-serial-killers/tv-ad-3.png">
</div>
<p>The TV ad appears to actually exist. It quotes an op-ed published in the Boston Globe and
<a href="https://archive.is/NTOTl">republished on Flock’s website</a>:</p>
<blockquote>
<p>[L]eft-leaning jurisdictions have turned against Flock cameras lately, concerned that the data they
generate could be used by immigration authorities to find immigrants living in the country without
authorization. We’re all pretty lucky, though, that other cities in Massachusetts haven’t followed
Cambridge’s lead, or else a serial killer might still be on the loose.</p>
</blockquote>
<p>This is a multi-billion dollar organization that has historically steered (more or less) clear of
politics—at least publicly. Until now.</p>
<h2>The Op-Ed</h2>
<p>I want to briefly touch on the content of Alan Wirzbicki’s reposted op-ed itself. The rhetorical
strategy is the typical cherry-picking. Select a success story—in this case, a murderer being
apprehended—and use it to justify the entire system as though it is the only possible thing that
could have possibly led to this outcome. It’s a tired and dishonest argument.</p>
<blockquote>
<p>left-leaning jurisdictions have turned against Flock cameras lately, concerned that the data they
generate could be used by immigration authorities to find immigrants living in the country
without authorization.</p>
</blockquote>
<p>It’s true that left-leaning jurisdictions have this concern. It’s a concern that is founded in
multiple high-profile incidents where <a href="https://www.404media.co/ice-taps-into-nationwide-ai-enabled-camera-network-data-shows/">Flock transfered information to the federal government</a>
without permission and in violation of law. The guardrails failed. Flock failed.</p>
<p>But “the left” is not the only group disturbed by mass surveillance. In other cases, police have
used electronic and mass surveillance to target right-wing groups.</p>
<p>These cameras don’t discriminate. They’ll track Antifa. They’ll also track the Proud Boys.</p>
<p>They will track law-abiding citizens on their way to Planned Parenthood or the gun store.</p>
<p>Left, right, we’re all suspects.</p>
<p>The author of the op-ed seems to have a brief moment of clarity when he notes that, despite Flock’s
assurances, the guardrails on this technology are fundamentally worthless:</p>
<blockquote>
<p>[G]uardrails or no, it’s hard for me to believe that municipalities could actually prevent
immigration authorities from accessing their Flock data if the feds really wanted it badly enough.</p>
</blockquote>
<p>But then he goes on:</p>
<blockquote>
<p>But at least to me, license plate readers are a much less threatening form of government
surveillance than, say, facial recognition software and cameras that scan crowds of people.</p>
</blockquote>
<p>He fails to connect his own dots. Regardless of what Flock offers as a service today, the capability
to record conversations and apply facial recognition across 250,000+ cameras and microphones is
there for the taking “if the feds really wanted it badly enough.”</p>
<p>Whether you’re in a “left-leaning” or a “right-leaning” city, once the cameras are up and the data
is being harvested, one thing is certain: there’s no take-backsies when the next guy takes office.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock's Censorship Gambit Fails at Cloudflare (Part V)]]></title>
            <link>https://footnote4a.org/news/cyble-part5</link>
            <guid isPermaLink="false">https://footnote4a.org/news/cyble-part5</guid>
            <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[After three weeks of review, Cloudflare rejects Cyble's baseless takedown complaint—citing Flock's own admission that the data came from public records.]]></description>
            <content:encoded><![CDATA[<p>After more than three weeks of investigation, Cloudflare has dismissed the baseless complaint filed
by Cyble, on Flock’s behalf, in an attempt to remove this website from the Internet. If you missed
parts one through four, here are the links:</p>
<div class="markdown-alert markdown-alert-note">
<p class="markdown-alert-title">Note</p>
<p><strong>February 5, 2025</strong>: The last email to Hetzner was on December 30. There has been no response and
it is unclear if they are still investigating. Hetzner never forwarded the document showing the
supposed relationship between Flock and Cyble.</p>
</div>
<ul>
<li>Part I: <a href="https://footnote4a.org/news/cyble-downtime">Flock and Cyble Inc. Weaponize “Cybercrime” Takedowns to Silence Critics</a> (Dec. 16)</li>
<li>Part II: <a href="https://footnote4a.org/news/cyble-part2">Flock and Cyble Inc. Continue to File False Notices</a> (Dec. 17)</li>
<li>Part III: <a href="https://footnote4a.org/news/cyble-part3">Flock and Cyble Inc. Pile on the Allegations with no Evidence in Sight</a> (Dec. 29)</li>
<li>Part IV: <a href="https://footnote4a.org/news/cyble-part4">Flock and Cyble: Aligned Values</a> (Dec. 31)</li>
</ul>
<p>The <em>tl;dr</em> is that Flock hired<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> Cyble to file takedown notices. This site’s original host, Cloudflare,
put a “phishing” interstitial on the site on December 16. The site moved to Hetzner while the takedown
was appealed. Cyble filed a complaint with Hetzner a day later.</p>
<p>Hetzner is still conducting its review (while the site remains online).</p>
<p>Cloudflare’s review is now complete:</p>
<blockquote>
<p>Upon further investigation, we have granted your appeal and we can confirm the restricted access to
the reported URL was removed on 01/08/2026.</p>
<p>Separately, we had contacted you regarding a potential violation of our Developer Platform Terms of
Service, which prohibit “content that discloses sensitive personal information.” This was in response
to a report claiming that “the website publicly and deliberately releases extensive sensitive information
obtained from Flock.”</p>
<p>Thank you for providing additional information, including a Flock Safety customer communication stating
that, “Based on what we have seen, websites like the one circulating online are using agency-released
public-records data.”</p>
<p>Based on our review, including the additional information provided, we found insufficient evidence of
a violation.</p>
<p>Thank you for your understanding and patience while we worked through this process.</p>
</blockquote>
<p>The “Flock Safety customer communication” Cloudflare cites is included below; it was obtained via an
Illinois FOIA request by <a href="https://www.lucyparsonslabs.com/">Lucy Parsons Labs</a> and <a href="https://www.muckrock.com/foi/mount-prospect-8189/flocksafety-emails-12-2025-mount-prospect-police-department-200393/">published on Muckrock</a>.</p>
<p>@<a href="https://footnote4a.org/blog/colwell-files/email.pdf">Flock customer email</a></p>
<p>Cloudflare got this one right. So did Flock’s own customer communications team, apparently.</p>
<p>Hetzner’s review continues while the site remains online.</p>
<p>To everyone who has continued to <a href="https://footnote4a.org/about/audit-logs">demand transparency</a> and accountability while Flock
invokes “officer safety” as a silencing mechanism: this is what winning looks like. It’s not a final
victory—just one less vector for censorship.</p>
<p>The public records remain public.</p>
<p>We’re just getting started.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Though whether Flock actually “hired” Cyble is technically unclear. See <a href="https://footnote4a.org/news/cyble-part4">Part IV</a>. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Two Tales of Real-World Flock Abuse]]></title>
            <link>https://footnote4a.org/news/ga-misuse</link>
            <guid isPermaLink="false">https://footnote4a.org/news/ga-misuse</guid>
            <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Two Georgia police officers face stalking charges after audit tools flagged repeated searches of the same plates. Flock's response: remove names from audit logs.]]></description>
            <content:encoded><![CDATA[<p>The Flock ecosystem relies on a specific promise: that local ‘internal affairs’
and audit logs are sufficient to prevent abuse. Recent criminal charges against
two Georgia law enforcement officers—a <a href="https://www.yahoo.com/news/articles/braselton-police-chief-resigns-announces-083652183.html">Police Chief</a> and <a href="https://www.wsbtv.com/news/local/former-georgia-sheriffs-office-employee-accused-stalking-people-using-department-flock-account/PDEZNDNDTBH5NNPGPZ7D7KPZKQ/">a
Sheriff’s Deputy</a>—suggest that this promise is hollow. Now, Flock is
moving to ensure those cases will be harder to detect.</p>
<p>First, to temper expectations: an after-the-fact justification is much easier
than identifying and validating findings regarding ongoing misconduct. These
incidents demonstrate that the tools here could be useful in some way, not that
they are fool-proof. Second, to my knowledge, neither Braselton’s Chief nor the
Echols County Deputy have been convicted of any crime. So far, wrongdoing has
been alleged, not proven.</p>
<p>With that out of the way, let’s examine the stories and the <a href="https://footnote4a.org/news/operator-insights">recently-added
operator insights pages</a>.</p>
<h2>Braselton’s Chief of Police</h2>
<blockquote>
<p>On Wednesday evening, Braselton Police Chief Michael Steffman announced he was
retiring and resigned from the department for personal reasons. He was booked
and charged, accused of using police cameras to stalk and harass people.</p>
<p>…</p>
<p>[Flock’s Josh] Thomas says Flock handed over a log that is built into the
system that allows them to see how, when and why the tech was used.</p>
</blockquote>
<p>As a sidenote: this is an interesting play from Flock—inserting themselves into
the narrative rather than relying on the “local oversight” they typically claim
is effective.</p>
<p>Opening <a href="https://footnote4a.org/pd/3501-braselton-ga-pd/operators">Braselton’s operator list</a>, it is not immediately evident
that the arrested person was Michael Steffman. Another officer’s behavior raises
more red flags in the system. You will have to draw your own conclusions based
on the information available.</p>
<p>Anyway, <a href="https://footnote4a.org/pd/3501-braselton-ga-pd/operator/O612Zm9F">Steffman’s Insights Page</a> shows multiple red flags on the first
page:</p>
<ul>
<li>Days Active: 101</li>
<li>Total Searches: 2,707</li>
<li>Unique Plates: 42</li>
<li>Unique Reasons: 4</li>
<li>Account Sharing Candidate (Temporal entropy 2.710)<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></li>
</ul>
<p>This already looks like someone looking up the same plates over and over at all
hours of the day without providing a valid reason.</p>
<p>But, who knows, maybe Braselton was conducting long-term surveillance for
operation “005”<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> and the Chief personally saw to it that any movement was
logged, 24/7.</p>
<p><img src="https://footnote4a.org/blog/ga-misuse/targets.png" alt="Surveillance Targets"></p>
<p>As a reminder: the “Target” column uses identifiers which represent license
plates.</p>
<p>We don’t have to get into the complexity of SAI: looking up the same license
plate 411 times should be a red flag.<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup></p>
<p><img src="https://footnote4a.org/blog/ga-misuse/411.png" alt="411 Searches of 1 Plate"></p>
<p>Zooming in, we can see that we have records of searches for this plate, by
Steffman, spanning October 2024 – August 2025; those dates more likely indicate
the end of the records period on <a href="http://haveibeenflocked.com">haveibeenflocked.com</a> than the end of the
searches.</p>
<p>20% of those searches were flagged as made outside of what the system flagged as
typical hours for Steffman (12pm – 12am).</p>
<p><img src="https://footnote4a.org/blog/ga-misuse/sessions.png" alt="Isolated Sessions"></p>
<p>Looking at the isolated sessions, Steffman did further lookups in between
extended periods of non-use; suggesting he was not on-shift at the time.</p>
<p>What makes this case exceptionally unusual, besides how rare arrests for these
cases are, is that Steffman’s employee record, which is also listed on the page,
indicates that he spent the last twenty years in Braselton.</p>
<p>In the world of policing, a twenty-year veteran and Chief is usually afforded
every benefit of the doubt. Not in this case, in Flock’s home state.</p>
<p>For a department to bypass internal discipline and move straight to handcuffs
and a media circus suggests toxic politics, at best. Especially when considering
the red flags for <a href="https://footnote4a.org/pd/3501-braselton-ga-pd/operator/N9wXdLJZ">other users in the
department</a>.</p>
<h2>Echols County Deputy</h2>
<p>This one is more straightforward. Echols County’s page shows “A. Ant” and “A.”
without overlapping time periods, suggesting that some time in June or July,
Anna Altobello shortened her name in the system. This appears to be a departmental
policy that tracks Flock’s <a href="https://footnote4a.org/about/name-resolution">desire to obfuscate</a>.</p>
<blockquote>
<p>The Georgia Bureau of Investigation said Anna Altobello, 33, misused Flock
Safety accounts belonging to the Echols County Sheriff’s Office to search for
tag information on people she knew personally, outside of law enforcement
purposes.</p>
<p>The GBI said it happened multiple times and Echols County Sheriff Randy
Courson asked the state agency to investigate in December.</p>
</blockquote>
<p>Looking at <a href="https://footnote4a.org/pd/4870-echols-county-ga-so/operator/0004L8?sort=date_desc">“A.”'s Operator Insights page</a> reveals a similar pattern as
Steffman’s:</p>
<ul>
<li>Days Active: 91</li>
<li>Total Searches: 691</li>
<li>Unique Plates: 36</li>
<li>Unique Reasons: 3</li>
<li>Account Sharing Candidate (Temporal entropy: 2.794)</li>
</ul>
<p>Her favorite reason to use is “Case”.</p>
<p><img src="https://footnote4a.org/blog/ga-misuse/a-target.png" alt="A.'s Surveillance Target list" width="500"></p>
<p>The Surveillance Target List looks eerily similar too, with the location history
for one plate being pulled 205 times over 124 days.</p>
<p>The data on the insights page, even at a glance, is suggestive of improper use.</p>
<h2>The Null Hypothesis: A System Feature?</h2>
<p>When analyzing this much data, one must consider the Null Hypothesis: that these
patterns are not evidence of stalking, but “noise” or software artifacts.</p>
<p>Perhaps “Temporal Entropy” indicates a disorganized shift schedule, or maybe
“411 searches of one plate” is how a specific investigative workflow functions.</p>
<p>However, the nature of the data makes that difficult to accept.</p>
<p>Hundreds of searches for vague reasons is by its nature suspicious. While it’s
conceivable that a few officers would be tracking someone 24/7 for legitimate
investigative purposes, logic dictates that police work in shifts more than the
data suggests.</p>
<p>Is 400 searches for a single plate for the reason “sus” hard evidence of
anything? No. Should it be investigated? Yes.</p>
<h2>Flock’s Fix</h2>
<p>In addition to analytical tools and blog posts, this website also exists to give
stalking victims a way to discover they’re being targeted: if you enter your
license plate <a href="/">on the main page</a> and your ex’s name comes up 411 times for
“inv”, odds are you are a victim of criminal stalking.</p>
<p>So what does Flock do in response?</p>
<p>It has <a href="https://footnote4a.org/news/colwell-files">removed names and license plates from network audit
logs</a>.</p>
<p>By redacting this information, Flock is making it impossible for external
auditors, including other police departments and stalking victims, to flag
suspicious behavior.</p>
<p>That, the company argues, would jeopardize “officer safety.”</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>The number (between 0 and 3.18) indicates “around the clock” activity. The higher the number,
the more usage is spread out over the day rather than concentrated in certain hours (e.g. daytime)
<a href="https://footnote4a.org/sharing-candidates">Read more here</a>. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Maybe 005 was his badge number? We can only guess. The reason was “005.” <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>The numbers, however, may be somewhat skewed <a href="https://footnote4a.org/news/secret-searches">because of redactions</a>. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>policy-legal</category>
        </item>
        <item>
            <title><![CDATA[Two Colorado cities abandon Flock oversight]]></title>
            <link>https://footnote4a.org/news/colorado-oversight</link>
            <guid isPermaLink="false">https://footnote4a.org/news/colorado-oversight</guid>
            <pubDate>Wed, 07 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Denver operates Flock cameras without a finalized contract. Boulder admits it won't audit search logs. Colorado's open records laws make oversight nearly impossible.]]></description>
            <content:encoded><![CDATA[<p>While Boulder admits to not performing any oversight, Denver has taken corporate mass surveillance
to the next level: the Mile High City allows Flock to operate its network without any contractual
safeguards whatsoever. After the city’s contract expired in October 2025, media reports that
<a href="https://www.9news.com/article/news/local/denver-new-flock-contract/73-e6f78040-f4f1-4148-95ed-63ad4138c6f4">the city’s mayor has signed a new contract</a>. That turns out not to be the whole truth:
there is no new contract.</p>
<p><img src="https://footnote4a.org/blog/colorado-oversight/chart.jpg" alt="A flow diagram titled &quot;The Colorado Accountability Gap.&quot; On the left, green arrows labeled &quot;Public Tax Dollars&quot; and &quot;Resident Privacy &amp; Data&quot; flow into a black box labeled &quot;Private Corporate Operation (Flock Safety).&quot; On the right, three red exit arrows show the breakdown: the top arrow to &quot;Signed Gov. Contract&quot; is shattered and labeled &quot;VOID (Denver)&quot;; the middle arrow to &quot;Public Audit Logs&quot; hits a brick wall labeled &quot;CCJRA &amp; Agency Discretion (Boulder)&quot;; and the bottom arrow points to a leaking cloud icon labeled &quot;Unregulated Data Sharing (Feds, Third Parties).&quot; The footer reads: &quot;Result: Taxpayer-Funded Infrastructure, Zero Taxpayer Control.&quot;"></p>
<p>The transition from public oversight to private operation has created a “surveillance black box”
where the legal safeguards promised by officials simply fail to materialize.</p>
<h2>Denver goes Private</h2>
<p>After a series of <abbr class="md-tooltip" data-tooltip="Colorado Open Records Act">CORA</abbr> requests, in which the Denver City Attorney bizarrely claimed not to be the
custodian of his own records, Denver Public Safety provided a stack of non-responsive documents,
Denver Technical Services claimed not to have a copy, and the Mayor outright ignored the request,
the City Auditor’s office finally wrote: “The city and county of Denver does not release contracts
that are being negotiated. If the contract does become final, it then can be released.”</p>
<p>The City Attorney’s Office, meanwhile, claimed it is “not the ‘custodian’” of the contract—despite
the Denver City Charter requiring that office to prepare and approve all city contracts. The
Department of Public Safety provided only the expired agreement, which terminated October 30, 2025,
and declined to produce the extension the mayor announced three weeks earlier.</p>
<p>The various creative denials appear to agree on one thing: the contract is not final and effective,
despite <a href="https://www.9news.com/article/news/local/denver-contract-extension-flock/73-7e60c226-ca74-4d4e-8ae0-2eb2b386fb90">previous announcements from the mayor’s office</a> heavily implying that it is.</p>
<p>This of course comes after the city <a href="https://www.9news.com/article/news/local/local-politics/denver-contract-flock-ai-drones-police-calls/73-0bcdc6c4-e98a-41bc-bd7d-7186260a2735">subscribed to Flock’s drone service without telling its
own surveillance task force</a>.</p>
<p>Although substantial public funds were used to install more than a hundred cameras, Flock still owns
them, and now appears to be operating them entirely outside of any active government contract.</p>
<p>This stands in stark contrast to the mayor’s statement, which claimed Flock would be <a href="https://www.denver7.com/news/front-range/denver/denver-bans-sharing-of-license-plate-reader-data-with-the-feds-as-part-of-five-month-flock-contract-extension">subject to
penalties</a> if the company shared data with federal authorities, in violation of Colorado law.</p>
<p>Although there are restrictions on what and how Colorado state and local agencies can share
information with the federal government, there appear to be no laws that prohibit Flock, a private
corporation, from disseminating that same data. Without a contract, there is nothing to stop the
company from selling the data to ICE or other interested third parties.</p>
<p>Denver residents are now in the worst of both positions: taxpayer funds paid for the infrastructure,
but no taxpayer-enforceable agreement governs how it operates. The city has outsourced surveillance
to a private company and then removed itself from the chain of accountability entirely.</p>
<p>If Flock shares data with federal agencies tomorrow, Denver has no contractual remedy. If the
mayor’s promised penalties exist anywhere, they aren’t in a signed document the city is willing to
produce.</p>
<h2>Boulder Abandons Oversight</h2>
<p>Meanwhile in Boulder, in response to a request for a month of network audit logs, BPD puts a couple
of interesting statements together:</p>
<blockquote>
<p>Given the scope of your request, we cannot, and will not, contact each individual agency listed to
inquire as to the status of their investigation as that would cause “unnecessary interference with
the regular discharge of the duties of the custodian or their office” (C.R.S. §24-72-304(1)). …
We are providing the requested records, but the names of the law enforcement personnel, associated
license plate numbers, case numbers, and reasons for the request are redacted as the release of
this information would be contrary to public interest.</p>
</blockquote>
<p>BPD admits here that it doesn’t know what’s in the search logs and it has no intention of auditing them.</p>
<p>None of this lines up with <a href="https://bouldercolorado.gov/services/flock-safety-cameras-and-boulder-police-department">statements on its public website</a>:</p>
<blockquote>
<p>The Boulder Police Department uses Flock solely for legitimate law enforcement purposes, including
criminal investigations, finding missing or endangered persons, Amber Alerts, and tracking stolen
vehicles. Officers must have a clear justification for any search they run.</p>
</blockquote>
<p>BPD does not know if this is how the cameras in Boulder are being used by other departments.</p>
<blockquote>
<p>All requests to share access to our data must be approved by a supervisor, logged, and tracked
through strict audit trails.</p>
</blockquote>
<p>But BPD will never look at these audit trails.</p>
<blockquote>
<p>Each user must have a unique login, and there is a complete audit trail of all searches conducted
in the system.</p>
</blockquote>
<p>Either BPD did not intend this statement to apply to users with access from outside BPD, or it
shows why BPD should examine its “complete audit trail.” Account sharing is rampant.</p>
<blockquote>
<p>Multiple safeguards protect against misuse: supervisory approval is required for external data
sharing and all searches are logged.</p>
</blockquote>
<p>This is not much of a safeguard when nobody looks at the logs.</p>
<blockquote>
<p>Flock’s focus on legitimate law enforcement purposes, combined with their willingness to implement
features like automatic blocking of immigration-related searches and enhanced audit controls,
aligns with Boulder’s commitment to responsible policing and community values.</p>
</blockquote>
<p>This “blocking” is a keyword-based warning notice that isn’t logged. A user can enter a different
reason, or enter no meaningful reason at all, and try again. BPD will never use the “enhanced audit
controls” (whatever those may be) to question whether “inv” is an immigration search.</p>
<p>There is no oversight.</p>
<h2>Colorado’s Open Records Laws are Broken</h2>
<p>As an Iowan, my experience with the Colorado Open Record Act (<abbr class="md-tooltip" data-tooltip="Colorado Open Records Act">CORA</abbr>) is limited. I find Iowa’s open
records act frustrating, because it is widely ignored and not enforced by state agencies, but <abbr class="md-tooltip" data-tooltip="Colorado Open Records Act">CORA</abbr>
turns out to be fundamentally broken.</p>
<p>In a bizarre twist, whether a public record should be released depends more on who holds the record
than on what the record is or contains. In addition to Denver’s outlandish ideas on custodianship,
which I doubt would survive a court hearing if challenged, there is a brokenness to <abbr class="md-tooltip" data-tooltip="Colorado Open Records Act">CORA</abbr> in that
records held by police are not governed by <abbr class="md-tooltip" data-tooltip="Colorado Open Records Act">CORA</abbr>, but by the Colorado Criminal Justice Records Act (<abbr class="md-tooltip" data-tooltip="Colorado Criminal Justice Records Act">CCJRA</abbr>).</p>
<p>The <abbr class="md-tooltip" data-tooltip="Colorado Criminal Justice Records Act">CCJRA</abbr> sets no deadlines and allows a high level of discretion for agencies on whether to release
records. As you can tell from Boulder’s response, which took nearly two months, we can’t trust
police with that type of discretion.</p>
<p>The <a href="https://coloradofoic.org/">Colorado Freedom of Information Council</a> is pushing for changes to the law.</p>
<p><strong><a href="https://coloradofoic.org/open-government-guide/#Colorado_Criminal_Justice_Records_Act">Read Colorado FOIC’s Guide to the Criminal Justice Records Act</a></strong></p>
<p>If you’re in Colorado, or even if you’re not, please consider making a donation to the Colorado FOIC
or supporting their work to get this flawed piece of legislation fixed.</p>
<p>Without transparency, BPD and Flock have to perform their own audits.</p>
<p>They have already said they “cannot and will not.”</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>policy-legal</category>
        </item>
        <item>
            <title><![CDATA[Has Flock Been Hacked? What Their Security Blog Post Doesn't Say]]></title>
            <link>https://footnote4a.org/news/never-hacked-facts</link>
            <guid isPermaLink="false">https://footnote4a.org/news/never-hacked-facts</guid>
            <pubDate>Tue, 06 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Flock claims it has "never been hacked." A fact-check of their January 2026 blog post reveals semantic games, undisclosed offshore contractors, and CJIS compliance failures.]]></description>
            <content:encoded><![CDATA[<p>“<a href="https://archive.is/oXy79">Has Flock Been Hacked?</a>” is the question the Flock Safety Blog asked itself today. The
article is a transparent<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> attempt to get ahead of the <abbr class="md-tooltip" data-tooltip="Search Engine Optimization">SEO</abbr> game. It repeats the same
tired points, and so will this fact-check, but such is the nature of fighting misinformation and
disinformation on the Internet.</p>
<p>The executive summary:</p>
<table>
<thead>
<tr>
<th>Flock Claim</th>
<th>Reality</th>
<th>Source</th>
</tr>
</thead>
<tbody>
<tr>
<td>“Cloud platform has never been compromised”</td>
<td>Scoped to exclude hardware vulnerabilities, network exposures, contractor access, and access control abuse</td>
<td><a href="https://archive.is/oXy79">Flock blog</a></td>
</tr>
<tr>
<td>“No customer data accessed or exfiltrated”</td>
<td>“Customer data” contractually excludes raw footage—the same footage <a href="https://www.kcrg.com/2025/12/24/cedar-rapids-police-cameras-among-dozens-exposed-unrestricted-access/">publicly streamed from Cedar Rapids</a></td>
<td><a href="https://footnote4a.org/news/iowa-logs">Contract language</a></td>
</tr>
<tr>
<td>“Customers own and control their data”</td>
<td>Contract grants Flock “non-exclusive, royalty-free, irrevocable, worldwide license” to use customer data</td>
<td><a href="https://archive.is/hh9uE">Standard contract</a></td>
</tr>
<tr>
<td>“No centralized database”</td>
<td>Shared SaaS infrastructure; network-wide hot lists enable cross-jurisdictional queries</td>
<td><a href="https://footnote4a.org/news/network-size">Network analysis</a></td>
</tr>
<tr>
<td>“Registered vulnerabilities with MITRE”</td>
<td>Only 4 CVEs registered; 50+ findings in Gaines report unaddressed</td>
<td><a href="https://github.com/GainSec/anti-crime-ecosystem-research">Gaines report</a></td>
</tr>
<tr>
<td>“Worked with researcher throughout study”</td>
<td>Researcher confirms Flock has not confirmed remediation of any reported issues</td>
<td><a href="https://github.com/GainSec/anti-crime-ecosystem-research">Gaines report</a></td>
</tr>
<tr>
<td>Offshore contractors</td>
<td>Not mentioned</td>
<td><a href="https://www.wired.com/story/flock-uses-overseas-gig-workers-to-build-its-surveillance-ai/">Wired</a>, <a href="https://www.upwork.com/ent/portal/flocksafety/">Upwork portal</a></td>
</tr>
<tr>
<td>CJIS compliance</td>
<td>Not mentioned; devices lack required encryption</td>
<td><a href="https://github.com/GainSec/anti-crime-ecosystem-research">Gaines report</a></td>
</tr>
</tbody>
</table>
<ul>
<li>Flock’s “never been hacked” claim is scoped to exclude hardware, contractors, and access abuse</li>
<li>Security vulnerabilities reported in February 2025 remain unpatched as of November 2025</li>
<li>Offshore Upwork contractors review surveillance footage without disclosed vetting</li>
<li>CJIS-required encryption is absent from Flock devices</li>
<li>No evidence of a Flock data breach notification to Iowa agencies despite documented
vulnerabilities and foreign contractor access.</li>
</ul>
<h2>Flock Security Vulnerabilities: Still Unpatched a Year Later</h2>
<p>Flock writes that “the theoretical vulnerabilities described were highly technical and would have
required physical access.” It does not write that these “theoretical vulnerabilities” no longer exist.</p>
<p>The issues were reported to Flock in February 2025. In November 2025, they were confirmed to still exist.</p>
<p>Flock writes in the past tense, but gives no indication that use of this tense is warranted.</p>
<p>A typical “trust us, we’re fine” security blog post follows a predictable pattern, to the point
where I’m certain there is a <abbr class="md-tooltip" data-tooltip="Chief Information Security Officer">CISO</abbr>-central where you can download form letters:</p>
<ul>
<li>We were made aware of a vulnerability on [date].</li>
<li>We worked with researcher A to develop a fix that we rolled out [shortly after].</li>
<li>We carefully examined our logs and determined no data was compromised. (Alt: We determined that a
limited set of data may have been accessed. Affected customers were notified in a separate email).</li>
<li>No action is required. (Alt: We recommend that you take X action immediately. We have disabled Y
until you do).</li>
</ul>
<p>Instead, nine months after Jon Gaines “worked with Flock throughout the study” (according to Flock’s
blog post), <a href="https://github.com/GainSec/anti-crime-ecosystem-research">his report states</a>, “the vendor has not confirmed whether any of the reported
issues have been remediated or are planned for remediation.”</p>
<p>The only action Flock has taken is to downplay the severity and exaggerate the complexity for the
better part of a year.</p>
<h2>Flock’s CJIS Compliance Failures</h2>
<p>There are several (well… many) issues with Flock’s compliance issues, but the most straightforward
one is that <a href="https://github.com/GainSec/anti-crime-ecosystem-research">the vulnerabilities Flock discusses in this post</a> show that Flock devices are
not encrypted.</p>
<p>Encryption is a <a href="https://footnote4a.org/news/federal-insecurity">hard requirement for <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services (CJIS) Security Policy">CJISSECPOL</abbr></a>.</p>
<h2>Who Can Access Flock Safety License Plate Data?</h2>
<p>While its overseas workers may access the data for other reasons, Flock states in its blog post that
“Flock employees do not access customer data except in tightly controlled, audited circumstances for
support or maintenance.”</p>
<p>Critically, the company does not define what those “tightly controlled, audited circumstances”
look like, who validates those controls, or who performs the audits. We can only assume it’s Flock
doing all of this in secret.</p>
<p>However, in its <a href="https://archive.is/hh9uE">contract</a>, Flock defines circumstances other than “support or maintenance” where
its employees may access and disseminate information, including when Flock has a “good faith belief”
that doing so is necessary for <a href="https://footnote4a.org/news/trojan-contracts">basically any reason</a>.</p>
<h2>Flock Offshore Contractors, Background Checks, and Foreign Data Access</h2>
<p><a href="https://footnote4a.org/news/overseas-data">We know Flock images and audio are reviewed by foreign Upwork contractors</a>.
Flock has not publicly acknowledged or commented on that fact. Flock <a href="https://www.wired.com/story/flock-uses-overseas-gig-workers-to-build-its-surveillance-ai/">hid the evidence after Wired
and 404Media reached out for comment</a>.</p>
<p>As of January 6, 2026, Flock’s <a href="https://www.upwork.com/ent/portal/flocksafety/">Upwork Enterprise Portal</a> is still online.</p>
<p>After national media reported on these contractors who are reviewing images and audio files, Flock did
not respond at all.</p>
<p>It did not put out a statement that its foreign contractors undergo rigorous vetting or that the
data collected by <a href="https://footnote4a.org/news/network-size">250,000+ devices</a> is not available to foreign actors.</p>
<p>It is also unclear if Flock considers Upwork contractors on the other side of the globe to be
operating under “tightly controlled, audited circumstances.”</p>
<h2>Flock Data Retention and Deletion Questions</h2>
<p>Based on my experience, “what happens after the retention period?” question is an actual “Frequently
Asked Question.” To my knowledge, Flock has not answered it beyond “data is automatically deleted”
(generally passively voiced).</p>
<p>The process for deletions, and, equally importantly, the process for validating whether deletions
are complete and irreversible, remains a mystery to this day.</p>
<p>This is a critical question because the storage solution the company uses, <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/DeletingObjects.html">AWS S3, offers
versioning and “soft deletes,”</a> a feature where a “deletion marker” is stored
alongside the actual file (possibly in low-cost archival storage).</p>
<p>This makes the file <em>appear</em> deleted to everyone, including the software, except S3-administrators
for whom restoring the file is a matter of either removing the marker, or copying the file while
ignoring the marker.</p>
<p>Of course, this is in addition to the contract granting Flock the “non-exclusive, royalty-free, irrevocable,
worldwide license to use the Customer Data,” for which Flock has not even begun answering the question.</p>
<h2>Flock Breach Notification: Iowa Case Study</h2>
<p>A public records request to the Iowa Department of Public Safety, which is responsible for
overseeing <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services (CJIS) Security Policy">CJISSECPOL</abbr>, indicates that neither Flock, nor any of its Iowa customers, made the
mandatory disclosures following <a href="https://github.com/GainSec/anti-crime-ecosystem-research">the February 2025 vulnerability findings</a>, or the findings
that <a href="https://footnote4a.org/news/overseas-data">overseas workers have access</a>.</p>
<p>It is likely no different in other jurisdictions.</p>
<h2>“Has Flock Been Hacked?” — What They’re Actually Saying</h2>
<p><a href="https://archive.is/oXy79">This article</a> was a trip. It comes on the heels of <a href="https://footnote4a.org/news/colwell-files">a December 8, 2025 mass
email</a> in which Flock’s Head Solutioneer, Chris Colwell, defensively states
that Flock has never been hacked and that the information published on “a third-party website [that]
began aggregating search information” was instead obtained via public record requests.</p>
<p>Maybe Colwell got the “Has Flock Been Hacked?” question via e-mail. Maybe he didn’t. Either
way, it’s oddly defensive posturing for a company whose CEO sends out mass emails saying it “adheres
to the highest security standards, including: NDAA, SOC2 (Type II), SOC3, ISO 27001, HECVAT, [and]
FERPA.”</p>
<p>Some of those aren’t even security standards, as I discussed in <a href="https://footnote4a.org/news/staunton-attack">a previous post</a>.</p>
<h3>How Flock Defines “Hacked” and “Breach”</h3>
<blockquote>
<p>Flock’s cloud infrastructure has never been compromised. There has never been an incident in which
customer data was accessed or exfiltrated by an attacker. This is not a matter of semantics or
technical spin; it reflects Flock’s actual security record since its inception.</p>
</blockquote>
<p>Immediately, Flock’s statements are limited to the “cloud platform.” This excludes:</p>
<ul>
<li><a href="https://github.com/GainSec/anti-crime-ecosystem-research">Hardware vulnerabilities</a></li>
<li><a href="https://www.404media.co/flock-exposed-its-ai-powered-cameras-to-the-internet-we-tracked-ourselves/">Network compromises</a>.</li>
<li><a href="https://www.9news.com/article/news/politics/atf-searches-ice-access-loveland-license-plate-tracking-cameras/73-f319ab3b-201d-42af-8dae-35870a63b94a">Data accessed through legitimate but abused access controls</a></li>
<li>Third-party <a href="https://footnote4a.org/news/dps-denmark">integrations</a> or <a href="https://footnote4a.org/news/overseas-data">contractors</a>.</li>
</ul>
<p>Industry standards consider a “breach” or a “compromise” to be any incident where an unauthorized
party has access, when data is disclosed without authorization, or when <a href="https://www.404media.co/ice-taps-into-nationwide-ai-enabled-camera-network-data-shows/">data control is lost</a>.
Flock’s definition is limited to “customer data was accessed or exfiltrated.”</p>
<p>This narrow definition of “hacking” excludes:</p>
<ul>
<li>Authorized access later deemed improper (rogue employee, abusive search).</li>
<li>Data shared under coerced or misunderstood “consent.”</li>
<li>Access by contractors they failed to disclose.</li>
<li>Exploitation of legitimate credentials.</li>
</ul>
<h3>Flock’s “Customer Data” Definition Excludes Footage</h3>
<p>“Customer data” appears to be an attempt at contractual finagling. If you’ve watched <a href="https://www.youtube.com/watch?v=vU1-uiUlHTo">Benn Jordan’s
video</a> you know that Benn was able to view a live feed of actual cameras being used to support
real-life operations.</p>
<p>This is the current definition of “customer data”:</p>
<blockquote>
<p>“Customer Data” means the images, audio and/or video segments made available to Customer through
the Web Interface in connection with the Flock Services, together with the metadata … For
clarity, Customer Data does not include the underlying raw Footage captured by the Flock Hardware</p>
</blockquote>
<p>By that definition, unauthorized persons downloading footage is not a “breach” or “access to customer
data” because “customer data” does not include footage.</p>
<p>There was still a <a href="https://www.kcrg.com/2025/12/24/cedar-rapids-police-cameras-among-dozens-exposed-unrestricted-access/">public Internet livestream of a man being hauled off in an ambulance</a>.</p>
<p>Shortly before Flock aired that livestream, Cedar Rapids indicated to <a href="https://footnote4a.org/news/iowa-logs">the ACLU of Iowa and
University of Iowa researchers</a> that its Flock contract has different language:</p>
<blockquote>
<p>“Customer Data” means the data, media, and content provided by Customer through the Services. For
the avoidance of doubt, the Customer Data will include the Footage.</p>
</blockquote>
<p>Under Flock’s definition, the public exposure of a man being loaded into an ambulance was not a
“breach” because raw footage isn’t “customer data.” Under Cedar Rapids’s contract, it was. Flock
gets to claim a clean security record by choosing which definition applies after the fact.</p>
<p>Flock further muddies the waters in its blog post when it writes “Every Flock customer, whether a
city, county, law enforcement agency, neighborhood, school, or business, retains full ownership and
control of the data collected on their behalf.”</p>
<p>These statements can’t all be true at the same time. It doesn’t matter to Flock because Google’s AI
won’t pick up on it. Poisoning the <abbr class="md-tooltip" data-tooltip="Search Engine Optimization">SEO</abbr>-well with corporate disinformation is a business decision.</p>
<h3>Flock Data Types: Strategic Obfuscation</h3>
<blockquote>
<p>Flock does not maintain a centralized database of license plate reader data across customers. We
do not sell or monetize vehicle data, and we do not share customer data without the customer’s
explicit authorization.</p>
</blockquote>
<p>In two sentences, no fewer than three types of data are introduced:</p>
<ul>
<li>License plate reader data</li>
<li>Vehicle data</li>
<li>Customer data</li>
</ul>
<p>To know whether the statement could potentially be true requires knowing the definitions of these
terms.</p>
<p>“We do not sell or monetize vehicle data” or “Flock does not maintain a centralized database of
license plate reader data across customers” <a href="https://footnote4a.org/news/network-size">certainly do not sound true</a>, but
there is undoubtedly a reason why the company chose to distinguish between “license plate reader
data,” “vehicle data,” and “customer data” all in one paragraph. And it’s not “for clarity.”</p>
<p>Perhaps the most baffling statement in the whole post is this one:</p>
<blockquote>
<p>LPRs do not capture point-in-time images of vehicles on public roadways</p>
</blockquote>
<p>I’m sure this too depends on some obscure, unspecified definition of “point-in-time image.” Maybe it
means that you can’t tell the Flock system “find me a picture of a car with plate 739APD at 10:45am
last Saturday” because you can only tell it “give me a 30-day location history for plate 739APD.”</p>
<p>Who knows. Even ardent Flock-fans can see that this statement is, at best, grossly misleading.</p>
<p>The important thing is that Flock asked itself “Has Flock Been Hacked?” and then proceeded to dodge
the question as though it were participating in a Senate confirmation hearing rather than writing
corporate fluff on its own blog.</p>
<h2>What Flock Safety Should Disclose</h2>
<p>First, <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services (CJIS) Security Policy">CJISSECPOL</abbr> requires compliance documentation to be submitted to the state’s <abbr class="md-tooltip" data-tooltip="CJIS Systems Agency">CSA</abbr> and the FBI.
For security vulnerabilities, this includes mitigation plans and/or compensatory controls. This
mandatory compliance documentation is public record. Disclose it.</p>
<p>Second, some security vulnerabilities require additional disclosure. The complete lack of encryption,
for example, is fundamentally incompatible with <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services (CJIS) Security Policy">CJISSECPOL</abbr>, which requires using a NIST-validated
encryption module. Name the modules.</p>
<p>Prove, or better yet, have an independent third party audit, AWS S3 configurations to confirm that
buckets are unversioned, and there are no “soft deletes.”</p>
<p>Release the CVE numbers. Flock claims it “registered relevant vulnerabilities with the National
Vulnerability CVE database via MITRE.” If true, those identifiers are public. Name them. If this set
is limited to the four issues previously registered, then Flock’s position is that the remaining 50+
findings in Jon Gaines’ report are not “relevant.” This is a concerning attitude when it comes to security.</p>
<p>Disclosing public compliance records and confirming which vulnerabilities have been patched, by
tracking them in a public vulnerability database or otherwise, does a lot more than writing an
<abbr class="md-tooltip" data-tooltip="Search Engine Optimization">SEO</abbr>-optimized blog post that relies purely on semantics and technical spin to say nothing of value.</p>
<p>Relying on security through obscurity <a href="https://cwe.mitre.org/data/definitions/656.html">is its own documented security vulnerability</a>.</p>
<p>Relying on security through denial is even worse.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>It is a rare occurrence where I accuse Flock of transparency. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[The 250,000+ Camera "City-Wide" Network]]></title>
            <link>https://footnote4a.org/news/network-size</link>
            <guid isPermaLink="false">https://footnote4a.org/news/network-size</guid>
            <pubDate>Sun, 04 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[A bug in Flock's system swept 257,806 cameras into an "ICE detainer" search. Flock claims no data was accessed—but California, Illinois, and Virginia prohibit such searches regardless.]]></description>
            <content:encoded><![CDATA[<p>As Flock <a href="https://footnote4a.org/news/burden-of-compliance">continues to battle transparency</a> and
<a href="https://footnote4a.org/news/secret-searches-part2">expunge the public record</a>, the logs—reduced as they may be—continue
to yield insights into the privately-owned and -operated Surveillance-as-a-Service network. The
latest: a drug task force out of Brookfield, Missouri (pop. ~4,000)
<a href="https://footnote4a.org/search?q=%22ice+detainer%22">retrieved a vehicle’s location history</a> and accidentally exposed the
scale of the Flock network—and, potentially, violated the laws of several states in the process.</p>
<div class="float-right ml-4 mt-4 inline-flex align-middle flex-col">
<div class="grid grid-cols-2 space-x-4 items-center">
  <img class="mb-1 w-70" src="https://footnote4a.org/blog/network-size/5000.png" alt="Flock homepage claims 5,000+ agencies">
  <img class="border rounded-lg mb-1 w-70" src="https://footnote4a.org/blog/network-size/networks.png" alt="Flock homepage claims 5,000+ agencies">
  </div>
  <p class="text-center text-muted text-xs mt-1">
  flocksafety.com homepage touting 5,000+ and "networks searched" showing 6,385
  </p>
</div>
<p>On its website’s main landing page, Flock claims it is “Trusted by 5,000+ law enforcement agencies.”
That number roughly lines up with the 5,730 agencies seen in search logs, and the ~6,400 “networks
searched” we see in network audit logs.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>Brookfield’s “ICE detainer” search, however, reveals a much bigger number: 25,263.</p>
<p>This search was logged twice, once at 04:10:13, and once at 04:10:31:<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<ul>
<li><strong>Name:</strong> “REDACTED”</li>
<li><strong>Organization:</strong> “North MO DTF Brookfield MO PD”</li>
<li><strong>Networks Searched:</strong> 25,263</li>
<li><strong>Devices Searched:</strong> “257,806”</li>
<li><strong>Time Frame:</strong> 10/30/2025, 10:06:10 PM UTC to 10/31/2025, 04:06:10 AM UTC</li>
<li><strong>License Plate:</strong> “REDACTED”</li>
<li><strong>Reason:</strong> “ICE detainer”</li>
<li><strong>Case #:</strong> “643”</li>
<li><strong>Filters:</strong> “REDACTED”</li>
<li><strong>Search Time:</strong> 10/31/2025, 04:10:13 AM UTC</li>
<li><strong>Type:</strong> “lookup”</li>
<li><strong>Text Prompt:</strong> <em>None</em></li>
<li><strong>Moderation:</strong> An issue was identified that caused the system to initiate unprocessed search
activity on a larger set of cameras than intended by the user. No footage or data from these
devices was accessed or viewed. The underlying bug has been fixed, and additional safeguards have
been implemented to prevent recurrence.</li>
</ul>
<p>The <em>moderation</em> field, which generally contains only the word <code>allow</code>, and is assumed to be the
outcome of Flock’s AI moderator checking for problematic searches, appears to contain a manually
entered case note instead.<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup></p>
<p>The critical phrase is: <strong>“No footage or data from these devices was accessed or viewed.”</strong></p>
<p>This implies that the 257,806 devices across 25,263 networks weren’t supposed to be <em>searched</em>, but
they actually do <em>exist</em> and have search and view capabilities.</p>
<p>This is both interesting and problematic. It is interesting because the size of Flock’s network is
the subject of some speculation. We can draw inferences from “total devices/networks searched,” but
we don’t know what individual agencies searched, or can access.</p>
<p>There are agencies that contractually have no restrictions on which Flock networks or cameras they
access, but these agencies don’t appear to conduct searches of significantly more networks or
devices than others. It’s possible that, in those cases, Flock only grants access to a subset of its
cameras, despite the terms.</p>
<p>@<a href="https://footnote4a.org/blog/network-size/joco.pdf" class="collapsible">Johnson County, IA MoU (unrestricted access)</a></p>
<div class="text-sm text-muted mb-4">
(<a href="https://footnote4a.org/pd/6730-johnson-county-ia-so/audit">Johnson County IA SO</a> & <a href="https://footnote4a.org/pd/8129-johnson-county-ia-so-inactive">Johnson County IA (inactive)</a> logs)
</div>
<p>Of course, the company treats audit logs—marketed as building community trust through transparency—
in much the same way as the CIA treats its “South America” Rolodex.</p>
<p>Still, knowing the background, we can continue <a href="https://footnote4a.org/news/flock-infer">inferring</a> based on these new log
entries showing 257,806 devices and 25,263 networks. The (plausible) facts:</p>
<ol>
<li>More than a quarter million Flock “devices” exist on Flock’s network.</li>
<li>Because this was a search for a plate, and the note mentions “footage” and “viewing,” all 257,806
“devices” are likely cameras (Falcon, Condor, Wing, etc.).</li>
<li>There are fewer than 25,263 agencies in the country;<sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup> the ~5,000–6,000 Flock-using
agencies is well-supported.</li>
<li>Even if the majority of ~6,000 agencies would have multiple networks, it would not come close to
the 25,263 number.</li>
</ol>
<p>The only reasonable conclusion, based on the available information, is that <strong>the 25,263 number
includes Flock’s retail customers</strong>, like Lowe’s, Academy Sports, and FedEx.</p>
<p>But there’s another implication: California, Illinois, and Virginia have enacted laws restricting
immigration-related searches of their ALPR data. If Flock’s bug exposed cameras in those states to
an “ICE detainer” search—even if, as the company claims, “no footage or data was accessed or
viewed”—that’s a potential violation of state law that Flock has disclosed to no one except through
a log entry nobody was meant to read.</p>
<p>The fact that these 257,806 devices are collecting <a href="https://www.nbcnews.com/tech/tech-news/flock-police-cameras-scan-billions-month-sparking-protests-rcna230037">over twenty billion plate scans every
month</a> is interesting and terrifying in itself, but not a complete shock.</p>
<p>What is more shocking is that once again, Flock’s poor security practices are revealed.</p>
<p>Even assuming the implausible note is true, and these (presumed) retail devices were not searched,
the capability is clearly there.</p>
<p>That means Flock’s access control is done through various vendor-managed flags and roles, rather
than through secure measures like encryption.</p>
<p>When a retailer or government believes it is sharing “<a href="https://footnote4a.org/news/trojan-contracts">its data</a>” with local
police, rather than having Flock register a secure password or encryption key for the local agency,
it’s a permission checkbox: “go ahead and disclose it, Flock.”</p>
<p>That is not control, and it’s not security.<sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup> It’s trusting a vendor that has shown it can’t be
trusted. It leaves the door wide open to unauthorized access, uncontrolled dissemination, and
software bugs.</p>
<p>In all likelihood, Flock did not proactively disclose this incident or the details of its
investigation and remediation steps.<sup class="footnote-ref"><a href="#footnote6">[6]</a><a class="footnote-anchor" id="footnote-ref6"></a></sup> Instead, it chose to edit the “immutable” logs and
updated the “moderation” field. The logs don’t indicate the (supposedly) intended search scope, nor
is there any way to verify if any other edits were made.</p>
<p>Flock’s customers—whether private retailers or California cops—simply have no way of knowing if this
search touched or disclosed data from “their” networks.</p>
<p>All we have is a statement hidden in a log file that nobody reads, in a field not intended for it,
where the company assures us, without providing evidence, that multiple states’ prohibitions on
immigration-related searches were not violated through this search.</p>
<p>What’s more, Flock, a single private corporation, now operates a camera for every 1,000 American
adults.</p>
<p>The company wants there to be many more, all built on the same fundamentally flawed security
framework: “trust Flock.”</p>
<p>This search demonstrates—again—why we can’t allow that.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Some customers appear to have multiple networks, separated by product type (e.g. one network for
“Falcon” and one network for “Raven” <a href="https://footnote4a.org/news/overseas-data">voice detectors</a>). <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>These times differ fairly significantly from the search window time of 04:06:26. This could
indicate the user was slow to complete the search form, or may indicate system issues. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>Again demonstrating the mutability of audit logs. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>17,541 in 2018, according to the
<a href="https://bjs.ojp.gov/library/publications/census-state-and-local-law-enforcement-agencies-2018-statistical-tables">Bureau of Labor Statistics</a> <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>It’s also expressly prohibited by CJISSECPOL. <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote6" class="footnote-item"><p>If it did, the disclosure should be available via open records request from any Flock-using
agency. If you have information that Flock took proactive steps,
<a href="mailto:hcvp@haveibeenflocked.com">reach out</a>. <a href="#footnote-ref6" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock and Cyble: Aligned Values (Part IV)]]></title>
            <link>https://footnote4a.org/news/cyble-part4</link>
            <guid isPermaLink="false">https://footnote4a.org/news/cyble-part4</guid>
            <pubDate>Wed, 31 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Y Combinator funds both surveillance infrastructure and the machinery to silence its critics.]]></description>
            <content:encoded><![CDATA[<div class="markdown-alert markdown-alert-note">
<p class="markdown-alert-title">Note</p>
<p>This article was updated on January 17, 2026 to include the <abbr class="md-tooltip" data-tooltip="Regional Organized Crime Information Center (&quot;Serving Alabama, Arkansas, Florida, Georgia, Kentucky, Louisiana, Mississippi, North Carolina, Oklahoma, South Carolina, Tennessee, Texas, Virginia and West Virginia, as well as Puerto Rico and the U.S. Virgin Islands.&quot;)">ROCIC</abbr>/FBI emails in the timeline.
See <a href="https://footnote4a.org/news/fbi-investigation">this article</a> for more detail.</p>
</div>
<p>Yesterday, I received a Flock customer email blast where
<a href="https://footnote4a.org/news/colwell-files">the company recommends leaving the nationwide network</a> to evade transparency.
It was sent out by Chris Colwell, Flock’s Vice-President of “Solutions Engineering”<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup>. Colwell
assures his police customers that “Flock has not been breached or compromised” and that the data
published on this site is “agency-released public-records data.”</p>
<p>That’s the version for Flock’s customers.</p>
<p>Behind the scenes, Flock and Cyble—companies birthed from the same Atlanta-area Y Combinator
network—are weaponizing opposing claims to silence a critic.</p>
<p>I wasn’t going to spend more time on Flock’s internal contradictions, but the sheer coordination of
this effort deserves a spotlight. It’s important that people know the type of company that local
elected officials are choosing to do business with, and that police are choosing to trust.</p>
<p>Flock knows they are on thin ice. If they filed meritless abuse notices themselves, they would be
wide open to a claim of tortious interference with a contract. A court case would open them up to
discovery—an expensive process where Flock’s internal communications would become public.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<p>So they use fellow Y Combinator company Cyble to do their dirty work. Send notices to take down a
critical website. Censorship-laundering. Of course, that can only really work if you keep your
plausible deniability plausible.</p>
<p>Flock being Flock … well, let’s go through it.</p>
<h2>The Timeline</h2>
<ul>
<li><strong>December 8</strong>: Flock sends out a mass email: “Flock has not been breached or compromised.” and
“websites like the one circulating online are using agency-released public-records data.”</li>
<li><strong>December 8</strong>: I receive a “Forgotten email notification” for the Cloudflare account.<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup></li>
<li><strong>Before December 10, 2025</strong>: Houston <abbr class="md-tooltip" data-tooltip="High Intensity Drug Trafficking Area">HIDTA</abbr> sends out a “Situational Awareness Bulletin” about
<a href="http://haveibeenflocked.com">haveibeenflocked.com</a>.</li>
<li><strong>December 10, 2025</strong>: <abbr class="md-tooltip" data-tooltip="Regional Organized Crime Information Center (&quot;Serving Alabama, Arkansas, Florida, Georgia, Kentucky, Louisiana, Mississippi, North Carolina, Oklahoma, South Carolina, Tennessee, Texas, Virginia and West Virginia, as well as Puerto Rico and the U.S. Virgin Islands.&quot;)">ROCIC</abbr><sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup> forwards the Houston bulletin to its coordinators.</li>
<li><strong>December 11</strong>: The FBI sends out an email to agencies stating “Flock has committed toremoving
officer usernames from future audits.”</li>
<li><strong>December 12</strong>: I receive an email: “Cloudflare has received information that the following URL
violates Cloudflare’s Developer Platform Terms of Service, which prohibit content that discloses
sensitive personal information”</li>
<li><strong>December 16</strong>: Cloudflare slaps a “phishing interstitial” on the site and forwards a report
submitted by Thomas Siah, of Cyble:</li>
</ul>
<blockquote>
<p>Logs or other evidence of abuse: The mentioned website is wrongfully using our client’s registered
trademark in the fake web page. The use of the Client’s registered trademark descriptively in the
reported URL in order to disguise or phish the general public has not been authorized by our
client.</p>
</blockquote>
<ul>
<li>
<p><strong>December 19</strong>: Siah sends a report to Hetzner claiming: “The website publicly and deliberately
releases extensive, sensitive information obtained from Flock” and “Additionally, the website may
be used to phish the general public on the name of Flock Safety which is a serious concern to
notify you.”<sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup></p>
</li>
<li>
<p><strong>December 29</strong>: Siah “supplements” the complaint by claiming “the website publicly and
deliberately discloses extensive, sensitive information obtained from Flock and its automated
license plate reader (ALPR) systems with the apparent intent to undermine law enforcement
operations.”</p>
</li>
</ul>
<h2>Thomas Siah: The Real Agentic?</h2>
<div class="grid grid-cols-2 w-full gap-6">
    <img src="https://footnote4a.org/blog/cyble-part4/intel.png" alt="Cyble Vision" class="block">
    <img src="https://footnote4a.org/blog/cyble-part4/blaze-it.png" alt="Blaze AI" class="block">
</div>
<p>Cyble’s core offering and flagship product revolve around autonomous <s>brand rep</s>cybersecurity
threat enforcement by using agentic AI to send takedown notices.</p>
<p>This works for Cyble, because, in 2022, the company “<a href="https://www.prnewswire.com/news-releases/cyble-enters-into-a-threat-intelligence-contributor-partnership-with-virustotal-301586526.html">Enter[ed] into a Threat Intelligence
Contributor Partnership with VirusTotal</a>” — meaning Google-owned VirusTotal will consider
reports from Cyble’s platform credible.</p>
<p>The fact that no automated notices appear to have been submitted and VirusTotal comes back clean for
<a href="http://haveibeenflocked.com">haveibeenflocked.com</a> means that “Cyble Vision” or “Blaze AI” or whatever other label they slapped on
ChatGPT did not flag the website and did not send an automated report.</p>
<p>But Flock didn’t go to the Cyble website and hit “checkout” to be assigned an AI bot and (probably)
an agent in Bengaluru being paid starvation-wages.<sup class="footnote-ref"><a href="#footnote6">[6]</a><a class="footnote-anchor" id="footnote-ref6"></a></sup> The person who filed the complaints
with Cloudflare and Hetzner, <a href="https://theorg.com/org/cyble/org-chart/thomas-siah">Thomas Siah</a>, was recently promoted(?) from being Cyble’s “Head
of Business Development, APAC,” to being its “Vice-President of Partner Success.”</p>
<p>If Cyble’s AI is as “agentic” as their marketing claims, why did a Vice President have to manually
file a report? Either the AI knows I’m not a threat, or the AI is a façade for manual censorship.</p>
<p>Whichever of these may be true, Cyble’s Singapore-based VP of Partner Success—and former Head of
Business Development for the Asia-Pacific region—Thomas Siah, has no business handling low-level
complaints for Flock.</p>
<p>Cyble is not a small company. It has offices and employees on multiple continents, and, according to
a quick search, has raised north of $40M in funding. And it’s no secret that “AI” companies often
use cheap offshore labor (<a href="https://footnote4a.org/news/overseas-data">Flock uses contractors for its AI detection</a>).
Cyble, very likely, is not the exception to this faux-rule.</p>
<p>But Siah is not cheap offshore labor. He is a high-level executive with a company that likely
carries a nine-figure valuation. It makes no sense for someone at the senior executive level in
Singapore to involve himself in managing a complaint against a website with a $10 hosting bill.</p>
<p>Unless that high-level executive coincidentally(?) graduated from the same Business Systems program
at Monash University in Melbourne, Australia, as Eric Tan, Flock’s former CIO.<sup class="footnote-ref"><a href="#footnote7">[7]</a><a class="footnote-anchor" id="footnote-ref7"></a></sup></p>
<p>Or unless the high-level executive works for another Y Combinator-backed company. And that company,
despite its main office being in Cupertino and its incorporation in Delaware, has its formal
headquarters in Alpharetta, next door to Flock. At an address registered to Cyble’s co-founder and
current COO Manish Chachada, who lists 25 years of “Full-time Senior Finance Executive” experience
in the Atlanta area on his public LinkedIn page.</p>
<p>It probably also helps for the executive filing the complaint to be in Singapore, outside the reach
of American courts.<sup class="footnote-ref"><a href="#footnote8">[8]</a><a class="footnote-anchor" id="footnote-ref8"></a></sup></p>
<h3>Y Combinator, Reddit, and Speaking Out</h3>
<p>This network of Y Combinator alumni—the tight-knit network both Flock and Cyble are part of—talks
about “aligned values” while it funds the surveillance infrastructure and the machinery to silence
its critics.</p>
<p><a href="https://x.com/garrytan/status/1856932483864170606">Flock’s first investors</a> were Y Combinator’s President and CEO Garry Tan, and Reddit
co-founder Alexis Ohanian. This led to Flock CEO Garrett Langley <a href="https://archive.is/Oh6TM">interviewing Ohanian for Flock’s
blog</a>.<sup class="footnote-ref"><a href="#footnote9">[9]</a><a class="footnote-anchor" id="footnote-ref9"></a></sup></p>
<p>In the interview, Langley starts a question with “One thing that Y Combinator pushes is the
relationship between co-founders.” YC partner Ohanian responds to that sentiment by doubling down:
“Where we align is where I really push founders to make sure they are aligned—on their values.”</p>
<p>Flock’s and Cyble’s values are aligned.</p>
<p>Stickied to the top of Alexis Ohanian’s <a href="https://www.reddit.com/user/kn0thing/">Reddit profile</a> is “<a href="https://www.reddit.com/r/blog/comments/5r43td/an_open_letter_to_the_reddit_community/">An Open Letter to
the Reddit Community</a>,” which railed against <a href="https://www.federalregister.gov/documents/2017/02/01/2017-02281/protecting-the-nation-from-foreign-terrorist-entry-into-the-united-states">Donald Trump’s January 2017 executive
order</a> directing DHS, the FBI, and intelligence agencies to implement:</p>
<blockquote>
<p>a process to evaluate the [visa] applicant’s likelihood of becoming a positively contributing
member of society and the applicant’s ability to make contributions to the national interest; and
a mechanism to assess whether or not the applicant has the intent to commit criminal or terrorist
acts. — <a href="https://www.federalregister.gov/documents/2017/02/01/2017-02281/protecting-the-nation-from-foreign-terrorist-entry-into-the-united-states">EO 13769</a>, “Protecting the Nation From Foreign Terrorist Entry Into the United
States”, January 27, 2017</p>
</blockquote>
<p>Ohanian strongly—and rightly—condemned the order, calling it “deeply un-American.”</p>
<p>Six months later, either not connecting dots or ignoring them, he first invested in Flock.</p>
<div class="grid grid-cols-2 gap-x-6 items-center">
    <img src="https://footnote4a.org/blog/cyble-part4/ohanian.png" alt="Photo of Langley and Ohanian at Flock">
    <img src="https://footnote4a.org/blog/cyble-part4/reddit.png" alt="Reddit post about Flock being used by ICE">
    <p class="text-xs block col-span-2 text-center mx-15">
        "Where we align is where I really push founders to make sure they are aligned—on their values.
        Specifically, complementary values and how founders work together."
        <br>
        <span class="text-xs block col-span-2 text-right">
            &mdash; Alexis Ohanian, Reddit Co-Founder and Flock investor, July 2, 2019
        </span>
    </p>
</div>
<p>Two years later, he told Garrett Langley “I have a Flock camera outside my home … I had the search
on vehicle color and it was able to pull up every white car that had passed by my camera.” Shortly
after that interview, his company contributed to another Flock funding round, alongside defense
investors Bedrock and Peter Thiel’s Founders Fund.</p>
<p>He then founded <a href="https://sevensevensix.com/">Seven Seven Six</a> and invested in Flock again—this time,
joined by Andreessen Horowitz.</p>
<p>His 2017 pro-immigrant, anti-authoritarian post is still stickied to his Reddit profile:</p>
<blockquote>
<p>Right now, Lady Liberty’s lamp is dimming, which is why it’s more important than ever that we
speak out and show up to support all those for whom it shines—past, present, and future. I ask you
to do this however you see fit, whether it’s calling your representative (this works, it’s how we
defeated SOPA + PIPA), marching in protest, donating to the ACLU, or voting, of course, and not
just for Presidential elections. — <a href="https://www.reddit.com/r/blog/comments/5r43td/an_open_letter_to_the_reddit_community/">/u/kn0thing</a>, An Open Letter to the Reddit
Community, January 30, 2017</p>
</blockquote>
<p>I am an immigrant speaking out against surveillance technology and the company deploying it.</p>
<p>A company that directly implements the 2017 executive order by using “<a href="https://www.aclu-wy.org/news/surveillance-company-flock-now-using-ai-report-us-police-if-it-thinks-our-movement-patterns-are/">predictive
intelligence</a>” to find “<a href="https://abc7news.com/post/border-patrol-is-monitoring-us-drivers-detaining-suspicious-travel-patterns/18180071/">suspicious travel patterns</a>” to find if anyone — not just
immigrants — “has the intent to commit criminal or terrorist acts.”</p>
<p>A deeply un-American company, whose only “aligned value” is profit.</p>
<p>We donated to the ACLU because we knew they would call this what it is: “<a href="https://www.aclu.org/news/privacy-technology/flock-roundup">authoritarian tracking
infrastructure</a>.”</p>
<p>We protested SOPA and PIPA because we knew large corporations send bullshit notices about trademarks
and phishing to shut down their critics.</p>
<p>Meanwhile, Flock has been using its investment money to <a href="https://therecord.media/flock-surveillance-technology-gunshot-voice-detection">detect human voices</a>, <a href="https://techcrunch.com/2025/01/08/flock-safety-quietly-hired-a-sitting-california-mayor-now-hes-suing-flock/">hire sitting
mayors</a>, <a href="https://footnote4a.org/news/reid">develop person-tracking</a>, and
<a href="https://footnote4a.org/news/cyble-downtime">pay Thomas Siah to shut down websites</a> … <a href="https://www.theguardian.com/us-news/2025/oct/04/ice-chicago-extreme-force-protesters-journalists">for officer safety</a>.</p>
<p>Lady Liberty’s lamp isn’t dimming—it’s being used to read your plates.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>A title that sounds impressive but obfuscates his actual role. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Their lawyers are also probably busy drafting a motion to intervene in <a href="https://www.courthousenews.com/san-francisco-man-sues-city-police-department-over-flock-camera-surveillance/">Michael Moore v.
SFPD</a>, the class action lawsuit filed in the N.D. of San Francisco last Sunday. The
Plaintiff’s attorney is Ramzi Abadou, who, according to his <a href="https://www.law.berkeley.edu/our-faculty/faculty-profiles/ramzi-abadou/">profile at Berkeley Law</a>, “has
been responsible for securing securities class action fraud recoveries exceeding $1.5 billion.”
These are about to be interesting times for Flock. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>Related to Flock? Who knows. The notification arriving shortly after an email blast sent out to
a bunch of cops raises questions in my mind. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p><abbr class="md-tooltip" data-tooltip="Regional Organized Crime Information Center (&quot;Serving Alabama, Arkansas, Florida, Georgia, Kentucky, Louisiana, Mississippi, North Carolina, Oklahoma, South Carolina, Tennessee, Texas, Virginia and West Virginia, as well as Puerto Rico and the U.S. Virgin Islands.&quot;)">ROCIC</abbr> is one of the <abbr class="md-tooltip" data-tooltip="Regional Information Sharing">RISS</abbr>—the <a href="https://footnote4a.org/news/riss-shell-game">federally funded, private corporations police use to
backdoor surveillance sidestep oversight</a>. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>This is the one where Siah used <a href="https://footnote4a.org/news/cyble-part3">pirated software</a> from a German “brand
reputation” company GlobalEyez to submit
<a href="https://footnote4a.org/blog/cyble-part3/globaleyez.jpg">a screenshot proving … input validation(?)</a> <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote6" class="footnote-item"><p>I have yet to see confirmation that Flock is a Cyble customer. Given the nature of both
companies, I would expect one of them to do a press release announcing a “strategic
partnership.” The attachment Siah hinted at in <a href="https://footnote4a.org/news/cyble-part3">Part III</a> sounds like it
might show that Flock <em>is</em> a customer—I will update if Hetzner forwards it. <a href="#footnote-ref6" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote7" class="footnote-item"><p>Tan left the company in September 2025. <a href="#footnote-ref7" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote8" class="footnote-item"><p>That said, I question the wisdom of putting the words “govt agencies” and “kindly suspend the
services” so close together. It’s a good thing I’m not a contract lawyer and don’t know latin. <a href="#footnote-ref8" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote9" class="footnote-item"><p>initialized would contribute to Flock’s $47M Series C funding round a few months later. <a href="#footnote-ref9" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock Tells Customers to Disable Nationwide Lookup After Public Records Expose Search Activity]]></title>
            <link>https://footnote4a.org/news/colwell-files</link>
            <guid isPermaLink="false">https://footnote4a.org/news/colwell-files</guid>
            <pubDate>Tue, 30 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Flock's VP of Engineering advises police customers to disable nationwide sharing after public records requests expose search activity. The company's solution: "redaction capabilities" coming in 2026.]]></description>
            <content:encoded><![CDATA[<p>Three weeks ago, Flock’s Vice President of Solution Engineering, Chris Colwell, sent out an email
blast suggesting Flock users temporarily disable their product’s core feature, national sharing.
Why? Because we’ve been showing you how those customers are using the network. Not to worry though,
Flock’s chief engineer assures his police customers, “we are actively developing product and policy
improvements, focusing on redaction capabilities.”</p>
<blockquote>
<p>We are aware that agencies across the country, particularly in states with broad public-records
laws, are seeing increased PRA/FOIA activity seeking, among other things, LPR search logs.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>Recently, a third-party website began aggregating search information that appears to have been
released through these public-records processes. We recognize that seeing investigative search
activity displayed publicly can raise understandable concerns about officer safety, investigative
integrity, community perception, and compliance with state law.</p>
</blockquote>
<p>@<a href="https://footnote4a.org/blog/colwell-files/email.pdf" class="collapsible">“What you Need to Know About Recent Online Disclosures”, December 8, 2025</a></p>
<p>Yes, Chris. Those concerns have been the point all along.</p>
<div class="markdown-alert markdown-alert-note">
<p class="markdown-alert-title">Note</p>
<p><strong>Update Jan 7, 2026</strong>: Colwell sent out a second email blast a day later. Its content is
largely the same, but includes more details on Flock’s three-step plan to reduce transparency and
accountability.</p>
<p>Colwell writes: <em>“Network Audits will no longer include officer name, specific plates searched,
vehicle fingerprint, and open text search reason to protect active investigations and ensure officer
safety”</em></p>
<p>@<a href="https://footnote4a.org/blog/colwell-files/email2.pdf" class="collapsible">December 9, 2025 email</a></p>
</div>
<p>He promises new tools for 2026, and continues:</p>
<blockquote>
<p>Until these new [redaction] tools are available, we recommend: Reviewing your sharing settings and
considering a temporary shift from Nationwide Lookup to Statewide Lookup, if that better aligns
with your agency’s legal guidance and operational risk posture.</p>
</blockquote>
<p>This recommendation—and this plan to bury the bodies—is an outright admission that the Flock system
is so critically flawed, and so widely abused, that it cannot survive public scrutiny.</p>
<p>Of course, <a href="https://footnote4a.org/news/staunton-attack">activists</a> everywhere commend the recommendation to leave the
nationwide network. Flock has spent years claiming this network is essential for public safety. Will
we have anarchy in the streets, or will it turn out to have been optional all along?</p>
<p>Anyway. Let’s talk about hiding the evidence.</p>
<h2>Officer safety and investigative integrity</h2>
<p>First, let’s define what we’re talking about with these terms.</p>
<p>Many states have statutes similar to this one from Texas:</p>
<blockquote>
<p>“Criminal history record information” means information about individuals collected by criminal
justice agencies consisting of identifiable descriptions and notations of arrests; detentions; the
filing of complaints, indictments, or informations and dispositions arising from complaints,
indictments, or informations; sentences; correctional status; and release. It includes
identification information, such as fingerprint records or photographs</p>
<p>A person commits an offense if the person knowingly or intentionally obtains criminal history
record information … uses the information for an unauthorized purpose, or discloses the
information to a person who is not entitled to the information.</p>
</blockquote>
<p>This would appear to cover most of the information in this search log entry:</p>
<p><img src="https://footnote4a.org/blog/colwell-files/tx-cji.png" alt="Houston disclosing CHRI" width="700" class="border-1 center"></p>
<p>The only item that was redacted by Flock and Houston PD was the license plate. This person’s name,
date of birth, phone number, and criminal history (“AGG ASSAULT DEADLY WEAPON”) were all entered
into an insecure system and then fired off to 3,000+ agencies.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<p><a href="https://footnote4a.org/sharing"><img src="https://footnote4a.org/blog/colwell-files/sharing-map.png" class="center w-[700px]"></a></p>
<p class="text-center text-xs">Not Houston. Houston hides who it shares data with.</p>
<p>In the statute’s terms: the information was knowingly or intentionally disclosed to 3,000+ persons
not entitled to the information. Not by the officer entering the information, but by Flock—an
unauthorized person that first knowingly or intentionally obtained the information, and then
re-disclosed it.</p>
<p>This continues to happen, even after a 157-page multi-jurisdictional report on
<a href="https://footnote4a.org/news/dupage-county">an active gang-related murder investigation</a> got leaked, and, just yesterday,
<a href="https://footnote4a.org/search?q=linx">a LINX report on a fatal hit-and-run</a> surfaced after it was pasted into a case
number field.</p>
<p>CHRI, CJI, intelligence data … various terms and statutes apply depending on the exact
information, context, and state. But the general pattern holds: statutes criminalize
indiscriminately sharing this type of information.</p>
<p>So … might I be so bold as to suggest not indiscriminately sharing such information? Not with
Flock, and not with the nationwide network.</p>
<p>I’m not a cop, but I think not criming could also help with the whole “reducing crime” thing.</p>
<p>Just a thought.</p>
<h2>Compliance with state law</h2>
<p>While I somewhat enjoy the idea that snarky blog posts and reposting audit logs proximately cause
police to violate the law, I’m sure that’s not what Chris means.</p>
<p>The only possible “concern” he could be referring to is the concern that this website would be
publishing evidence that agencies are not compliant with state law. This is a valid concern. See
above.</p>
<p>The solution is the same as before: stop breaking the law.</p>
<p>A pattern emerges.</p>
<h2>Community Perception</h2>
<p>And finally, the only concern worth taking seriously: “community perception.”</p>
<p>This is valid.</p>
<p>The community will not perceive it as a positive that the system they were
<a href="https://footnote4a.org/news/amber-reasons">promised would be used to find missing children</a>, is actually being used for
reasons like
“<a href="https://footnote4a.org/search?q=Operation+Homeless+Intel-+Make+your+own+case!">Operation Homeless Intel- Make your own case!</a>”,
to <a href="https://footnote4a.org/search?q=%22id+occupants%22">perform blatantly unconstitutional searches</a>, or to investigate
“<a href="https://footnote4a.org/search?q=%22gypsy+crap%22">gypsy crap</a>”.</p>
<p>The community may also take a dim view of Flock users obtaining a 30-day history of someone’s
whereabouts simply because they were “<a href="https://footnote4a.org/search?q=%22per+a+karen%22">‘suspicious’ per a karen</a>.”</p>
<p>Flock and police promised the community these things would not happen.</p>
<p>They promised “the system requires a detailed search reason” and that these “detailed reasons” would
be stored in a “permanent log file.” Police chiefs stood before city councils, assuring them logs
would be audited regularly. Many even adopted policies to that effect.</p>
<p>Yet, this website shows nationwide searches for “<a href="https://footnote4a.org/search?q=inv">inv</a>” and “<a href="https://footnote4a.org/search?q=sus">sus</a>”
have consistently made it past the scrutiny of every single police chief who promised the community
that “we own the data and we have full control over who gets access.”</p>
<p>There have been hundreds, if not thousands, of these promises. ALPR policies that require audits are
everywhere. Every day, these policies collectively promise, police officers across the country will
audit hundreds of thousands of searches.</p>
<p>Every single “<a href="https://vcij.org/stories/state-of-surveillance">sleepy Virginia town</a>” that commits
to reviewing nationwide search logs is committing to reviewing around 150,000 searches every single
week. In each of these audits, every single instance of “sus” or “inv” should—ironically—be
considered suspicious and be investigated.</p>
<p>Even assuming only a fraction of Flock’s customers commit to audits, on average there should be
approximately two million phone calls or emails between police departments demanding answers about
“inv” and “sus” every single day.</p>
<p>I have not heard of one.</p>
<p>Hundreds of thousands of entries containing only <code>&quot;inv&quot;</code>, <code>&quot;sus&quot;</code>, or <code>&quot;test&quot;</code>. Or, you can “Make
your own case!” in <code>&quot;Operation Homeless Intel&quot;</code>.</p>
<p>“Agencies own and control the data” (but “for clarity,” that’s not in the TOS).</p>
<p>And now, the “permanent, immutable audit logs” are on the 2026 roadmap to redact.</p>
<p>Community perception is a valid concern when such a massive breach of trust is put on full display.</p>
<h2>Redaction: Why not?</h2>
<p>I want to touch on redaction. It’s not complicated. It’s not expensive. This website’s entire
redaction library, which is relatively complex because it aims to balance privacy with transparency,
comes in at less than 1,000 lines of code. It takes seconds to process millions of records on a
small laptop.</p>
<p>It takes even less code to truncate a field so you can’t paste entire reports in there.</p>
<p>For any non-programmers who might be reading this, this is literally, without exaggeration, the
single change needed, and the one Flock has failed to implement for years now:</p>
<!-- prettier-ignore -->
<pre><code class="language-html">&lt;input type=&quot;text&quot; /&gt;                  &lt;!-- ❌ active murder investigations are compromised --&gt;
&lt;input type=&quot;text&quot; maxlength=&quot;420&quot; /&gt;  &lt;!-- ✅ professional-grade solution engineering --&gt;
</code></pre>
<p>That’s it. <code>maxlength=&quot;420&quot;</code>.</p>
<p>420 characters is more than enough to accommodate the typical “reason” length of 7 characters. Even
if a cop decided to go a little cray-cray and write an actual justification, 400 characters would
accommodate it. They can use the remaining 20 for their badge number.</p>
<p>You’re welcome, seven-billion-dollar tech company.</p>
<p>You can pull my address from Flock Nova and mail me a check.</p>
<p>But instead of making this simple change, Flock hangs on to its unrestricted fields. There is not
even a “hey maybe don’t enter this,” like there is for searches that might more overtly violate law.</p>
<p>Now, when these problems are finally coming to light, Flock’s solution is to go into the archives
and ham-fistedly replace entire categories of data—which its customers need to be able to access to
comply with state, local, and federal law (not to mention the ALPR policy promising audits)—in its
“immutable” and “permanent” logs and replace them with the word
“<span class="smallcaps">redacted</span>.”</p>
<p>Right now, this change appears to affect existing records. Altering public records is a criminal act
in many, if not most, states. If Flock is actually making the information available to police and
police are ticking (or leaving ticked) the “hide information” boxes, they may run afoul of open
records laws. Either way, it looks like someone is about to take on some extra liability (hint:
Flock added a new paragraph to its ToS on December 19—guess what it’s about?).<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup></p>
<p>Flock is handing police a shovel to bury the records while quietly changing the contract to say the
legal fallout is not on Flock.</p>
<p>The solution Flock is implementing is overly complex and costly. Scroll up. Does that need to be
delivered in “Early 2026,” after the lawyers have had time to review and deploy the TOS change, or
could it have been implemented before Colwell’s email was even done sending?</p>
<h2>Who needs redaction when you have AI?</h2>
<p>The reason why Flock will not redact anything is its business model. It is causing the company’s
constructs to collapse.</p>
<p>Flock does not, as it likes to pretend, exist only in the abstract. Its cameras aren’t only found
along country roads, magically snapping pictures of “only license plates” in its stated effort to
eliminate crime.</p>
<p>Flock doesn’t exist to eliminate crime. It exists to make money. It has a fiduciary duty to its
shareholders to prioritize profit. To make a profit, it requires unregulated data, free and clear,
unencumbered by public records law or restrictions on criminal justice information.</p>
<p>It requires data it can feed into LLMs. Data it can mine. Data it can convert into “actionable
insights” and then sell. <a href="https://nexanet.ai/blog/license-plate-reader-company-flock-said-it-does-not-use-dark-web-data-my-analysis-of-their-code-tells-a-different-story">It doesn’t matter how the data gets there</a>, what the
<a href="https://footnote4a.org/reason-cloud">quality of that data</a> is, <a href="https://footnote4a.org/news/federal-security">how secure it is</a> or what it’s
being used for.</p>
<p>Amassing vast amounts of data is a substitute for
<a href="https://footnote4a.org/news/overseas-data">expensive manual training that often requires sending your data abroad</a>. And
what better way to gather that data than convincing the government to pay you to pepper public
places with cameras and microphones? What better way to be <a href="https://footnote4a.org/news/dot-permits">exempt from permits</a>
and licensure?</p>
<p>These days, everyone has AI. It’s the data that differentiates. It’s the data Flock has
<a href="https://footnote4a.org/news/trojan-contracts">seized for its own use</a>. Colwell knowingly misleads his customers when he
says “all Flock data is owned and controlled by the agency that collected it.”</p>
<p>Flock’s customers don’t collect data when they use Falcon/LPR. Flock does. This isn’t pedantry: it’s
language in a mass email from a high-level Flock executive about legal compliance.</p>
<p><a href="https://footnote4a.org/news/trojan-contracts">Flock’s terms of service state, “for clarity”</a>:</p>
<blockquote>
<p><strong>Customer Data does not include the underlying raw Footage</strong> captured by the Flock Hardware […]
“Footage” means still images, video, audio, and other raw data captured by the Flock Hardware or
Customer Hardware via the Flock Services.</p>
</blockquote>
<p>So instead of addressing any of the actual problems, which would mean collecting less data or
deleting some of the data, Flock’s solution is to
<a href="https://footnote4a.org/news/secret-searches-part2">hide the data from its customers</a>.</p>
<h2>The Sunlight Phase</h2>
<p>When I launched this project, I included a statement on the front page titled “Should you be
publishing this information?” It argued that sunlight is the best disinfectant.</p>
<p>Flock’s recommendation to shut down the nationwide network proves it.</p>
<blockquote>
<p>This website aggregates and reformats already-public information. This information represents a
fraction of what’s being shared with Flock and its government, commercial, and private partners on
a daily basis.</p>
<p>Policies exist to prevent the release of this information—they are not adhered to. Laws and
regulations exist to enforce the policies—they go unenforced. Police, Flock, and politicians have
been ignoring these problems for years while your private movements continue to be collected,
catalogued, sold and traded.</p>
<p>This website exposes the problem because, as the old saying goes, sunlight is the best
disinfectant. Law enforcement and legislation are needed to address the cause of the problem, and
we highly encourage you to bring this site to the attention of your legislators.</p>
<p>We believe mass surveillance has no place in a free society, and this data should not be collected
to begin with. If it is collected, warrants should be used, lookups should be rare, and police and
private parties, like Flock and <a href="http://HaveIBeenFlocked.com">HaveIBeenFlocked.com</a>, should not be permitted to act without
functional restraints or oversight.</p>
</blockquote>
<p>We have entered the sunlight phase.</p>
<p>In his email, Colwell writes that the new “enhancements” are planned for early 2026. That gives them
about 48 hours to find a new way to hide the truth.</p>
<p>We’ll be here. Filing open records requests.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>If you contributed to this, thank you! If you haven’t done so yet, check out
<a href="https://footnote4a.org/about/audit-logs">the page on audit logs</a>, visit <a href="https://www.muckrock.com/">Muckrock</a>, and find state-specific
information from your local freedom of information council, ACLU, or other public interest or
journalism organization. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>The number in this particular log entry is suspicious. 3,160 devices in 3,160 networks. Could be
a parsing error, could be the <a href="https://footnote4a.org/irregular-records">logs not telling the truth</a>. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>9.4 Customer Indemnity. To the extent permitted by law, Customer shall indemnify and hold
harmless Flock against any damages, losses, liabilities, settlements, and expenses in connection
with any claim or action that arises from an alleged violation of Customer Obligations,
Customer’s Installation Obligations, Customer’s sharing of any Customer Data, including any
claim that such actions violate any applicable law or third party right. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>foia-transparency</category>
        </item>
        <item>
            <title><![CDATA[Flock Decides Cops Can't Be Trusted with Cop Data]]></title>
            <link>https://footnote4a.org/news/secret-searches-part2</link>
            <guid isPermaLink="false">https://footnote4a.org/news/secret-searches-part2</guid>
            <pubDate>Mon, 29 Dec 2025 22:30:00 GMT</pubDate>
            <description><![CDATA[Flock unilaterally stripped officer names, license plates, and filters from the audit logs it provides to police agencies—the same logs the company touts as 'immutable' and 'tamper-proof.']]></description>
            <content:encoded><![CDATA[<p>Ah, Christmas. This year, Flock brings us the gift of contractual liability, and, if our elected
officials and state auditors are starting 2026 with fresh energy, a whole lot of canceled mass
surveillance contracts. Thanks, <s>Flo</s>Santa!</p>
<div class="markdown-alert markdown-alert-note">
<p class="markdown-alert-title">Note</p>
<p><strong>Update Jan 7, 2026</strong>: Flock’s VP of Solutions, Chris Colwell, sent out an email blast on
December 9<sup>th</sup> of last year. Its content is largely the same as that in <a href="https://footnote4a.org/news/colwell-files">his December 8 email</a>
but it offers greater specificity about Flock’s unilateral decision to remove the audit trail.</p>
<p>In the email, Colwell writes: <em>“Network Audits will no longer include officer name, specific plates
searched, vehicle fingerprint, and open text search reason to protect active investigations and
ensure officer safety”</em></p>
<p>@<a href="https://footnote4a.org/blog/colwell-files/email.pdf" class="collapsible">December 8, 2025 email</a>
@<a href="https://footnote4a.org/blog/colwell-files/email2.pdf" class="collapsible">December 9, 2025 email</a></p>
</div>
<p>Only a week ago, I wrote a post titled
“<a href="https://footnote4a.org/news/trojan-contracts">Flock is altering the deal. Pray it does not alter it further</a>.”</p>
<p>It has altered it further.</p>
<p>Flock already <a href="https://footnote4a.org/news/burden-of-compliance">removed useful information</a> from its ironically-named
Transparency Portals to deal with what the company termed “the burden of compliance.”</p>
<p>Then, as the new info box added to
<a href="https://footnote4a.org/about/name-resolution">the haveibeenflocked.com name resolution page</a> has noted since earlier this
month:</p>
<blockquote>
<p>Our ability to identify officers was clearly effective. In a direct attempt to stop us from
providing transparency, Flock and police departments have dropped the unique IDs (UUIDs) in the
transparency portals entirely. They now simply replace them with the word
“<span class="smallcaps">redacted</span>” in the public audit logs, effectively preventing
oversight and individual accountability.</p>
</blockquote>
<p>Now, Flock has extended that “functionality” to its own customers.</p>
<p>We learned from the company’s new, <a href="https://footnote4a.org/news/cyble-part3">nonsensical takedown notice</a> that it
considers audit logs to “pose an immediate threat to public safety and expose law enforcement
officers to danger.”</p>
<p>Apparently, that threat is also posed by Flock’s customers — the police officers themselves.</p>
<p>The vendor — still a privately-owned corporation — has decided it no longer trusts police with
information about who has searched “<a href="https://footnote4a.org/news/trojan-contracts">their data</a>.”</p>
<p>“Don’t worry,” Flock tells cops, “it’s for your own good.”</p>
<p>At least, that’s what we hear from an officer responding to an open records request:</p>
<blockquote>
<p><strong>Flock Safety updated the system on 12/11/2025 to protect officer safety and active
investigations, Network Audit Logs no longer include officer names, license plate, or vehicle
fingerprint information.</strong> This is a system update from Flock Safety not [Local] Police.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup>
With recent concerns about Flock [Local] Police conducted a review of shared networks and removed
all out of state access to our system.</p>
</blockquote>
<p>This, of course, comes on the heels of Flock’s announcement that the reason field
<a href="https://footnote4a.org/news/official-use-only">is now a dropdown</a>, from which you may select one of Flock’s expertly
curated pre-approved reasons.</p>
<p>Which followed shortly after the announcement that
<a href="https://footnote4a.org/moderation-logs">Flock does not log searches that are flagged as problematic</a>. Select another
justification and try again.</p>
<p>If you’re a cop or a city, you no longer get to know who searched the data collected in your town.
You don’t even get to know what was being searched for. If the company feels like it, you may get
one of a handful of pre-approved reasons.</p>
<p>But only if the anonymous other party feels like making a selection — simply clicking something that
will be accepted by the system is also an option … it’s not like anyone is logging your name.</p>
<p>Here are log entries from three different agencies (from before the dropdown was implemented):</p>
<pre><code class="language-csv">Name, Org Name, Total Networks Searched, Total Devices Searched, Time Frame, License Plate, Reason, Case #, Filters, Search Time, Search Type, Text Prompt, Moderation
&quot;REDACTED&quot;,&quot;Shelby Township MI PD&quot;,4341,&quot;4341&quot;,&quot;03/31/2024, 07:22:46 PM UTC
22:46 PM UTC&quot;,&quot;REDACTED&quot;,&quot;COM-13-24&quot;,&quot;&quot;,&quot;REDACTED&quot;,&quot;04/01/2024, 07:22:59 PM UTC&quot;,&quot;lookup&quot;,&quot;&quot;,&quot;&quot;
...
&quot;REDACTED&quot;,&quot;Houston TX PD&quot;,5888,&quot;5888&quot;,&quot;09/27/2024, 05:00:45 AM UTC
10/04/2024, 05:00:45 AM UTC&quot;,&quot;REDACTED&quot;,&quot;INV&quot;,&quot;&quot;,&quot;&quot;,&quot;10/04/2024, 05:00:47 AM UTC&quot;,&quot;lookup&quot;,&quot;&quot;,&quot;&quot;
...
REDACTED,[Federal] US Postal Inspection Service,3241,54164,&quot;11/10/2025, 11:00:24 PM UTC
11/17/2025, 11:00:24 PM UTC&quot;,REDACTED,4238996,4238996,REDACTED,&quot;11/17/2025, 10:30:32 PM UTC&quot;,lookup,,
</code></pre>
<p>Newly missing:</p>
<ul>
<li>Name (“Operator name” as it’s referred to on this site)</li>
<li>License plate<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></li>
<li>Filters</li>
</ul>
<p>Whether the “Text Prompt” and “Moderation” fields are empty because they’re unredacted, or because
they’re simply empty and haven’t been replaced with the word <span class="smallcaps">redacted</span>
is unclear.</p>
<p>Anyway — it’s almost becoming a predictable pattern, but bear with me once again as I quote Flock’s
CEO and then tell you he lied:</p>
<blockquote>
<p>Why Auditing is Crucial: To underscore accountability, every single search conducted in the Flock
LPR system is saved in an audit report. Every time a search is run on the Flock system, that
search and search reason is preserved permanently in the audit trail of every agency whose camera
was included in the search. — Garrett Langley, “Setting the Record Straight: Statement on Flock
Network Sharing, Use Cases, and Federal Cooperation”, June 2025.</p>
</blockquote>
<p>Actually, to change it up a little, let me also cite the section “Flock’s privacy-by-design and
accountability” from the company’s November 11, 2025, impossibly boringly-titled blog post,
“Automated License Plate Readers and the Fourth Amendment: A Public‑Safety‑by‑Design Perspective
from Flock”:</p>
<blockquote>
<p>Immutable accountability: Every user action and search reason is recorded in an indefinitely
available audit trail.</p>
</blockquote>
<p>And, because it’s Christmas, let’s throw in the company’s “Ethical Creed,” which it actually
publishes on its webpage:</p>
<blockquote>
<ol>
<li>Transparency and accountability build trust between communities, government, and law
enforcement – making communities safer and more equitable.</li>
<li>Democratic decision making and local autonomy should be encouraged and respected.</li>
<li>With the right technical and policy safeguards, public safety technology will not infringe on
constitutionally protected rights.</li>
</ol>
</blockquote>
<p>In this case, the “immutable record” that is supposed to “build trust” has been altered (again).</p>
<p>Not through “democratic decision-making” or “local autonomy,” but through a decision to modify the
service contracted for—a decision made unilaterally by Flock, without consulting its customers,
while they are probably spending time with their families.</p>
<p>Because, apparently, what Flock wants now trumps “safer” and “more equitable” communities, and even
if it causes a little light infringement on constitutional rights, if we can drop those annoying
safeguards that keep <a href="https://footnote4a.org/news/dupage-county">exposing the company’s poor practices</a>, maybe it’s worth
it. For <s>Shareholder va</s>Officer Safety.</p>
<p>All that is to say: Flock has expunged the “<a href="https://footnote4a.org/news/secret-searches/">permanent record</a>.”</p>
<p>If Flock was talking about your city council when whoever they pay to write blogposts wrote:</p>
<blockquote>
<p>Every search made within the Flock platform is logged and auditable, creating a tamper-proof trail
of accountability. Agencies can trace back who accessed what information, when, and why. This
audit feature is a critical deterrent against misuse and is often cited in public hearings as a
reason for community support. — Flock, “The Power of Connected Intelligence”, September 18, 2025.</p>
</blockquote>
<p>Then now is the time to let them know that Flock has committed a material breach of the contract —
it reneged on the democratically-approved deal (however tenuous that approval might be sometimes).</p>
<p>Your city council may have even said, “I trust our local police department.”</p>
<p>Flock does not.</p>
<p>The company lied to you <a href="https://footnote4a.org/news/federal-insecurity">about data security</a>,
<a href="https://footnote4a.org/news/staunton-attack">about compliance</a>, <a href="https://footnote4a.org/news/secret-searches">about transparency</a>, and even
<a href="https://footnote4a.org/news/amber-reasons">about finding missing children</a>.</p>
<p><a href="https://footnote4a.org/news/trojan-contracts">They took your city’s data</a> and are now selling it.</p>
<p>Just like they said they wouldn’t.</p>
<p>For your safety.</p>
<hr>
<p>PS: Flock chose not to redact case numbers (yet). Naturally, even while importing a heavily redacted
dataset, the importer called out an instance where
<a href="https://footnote4a.org/search?q=linx">someone pasted an entire LINX entry about a fatal hit-and-run into the case number field</a>—officer
name, defendant name, date of birth, charges, and all. The haveibeenflocked system truncated and
partially redacted the entry for privacy, which is more than Flock managed. This is exactly the kind
of reckless incompetence Flock is trying to hide. Unfortunately, they can’t even do that right.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Although I generally have no issues naming officers and agencies acting in their official
capacity, I am concerned this officer or agency could face backlash from Flock and its partners
for doing something decent—I am therefore choosing not to publish names at this time. For
officer safety. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>If you’re thinking about getting “REDACTED” as a plate: New York, New Mexico, Ohio, and possibly
Indiana appear to permit 8 characters on their vanity plates. Send me a picture. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>audit-log-analysis</category>
        </item>
        <item>
            <title><![CDATA[Flock and Cyble Inc. Pile on the Allegations with no Evidence in Sight (Part III)]]></title>
            <link>https://footnote4a.org/news/cyble-part3</link>
            <guid isPermaLink="false">https://footnote4a.org/news/cyble-part3</guid>
            <pubDate>Mon, 29 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[The third installment in this series on when a government contractor pays a company for "Takedown Services" to prevent transparency in government]]></description>
            <content:encoded><![CDATA[<p>If you missed <a href="https://footnote4a.org/news/cyble-downtime">Part I</a> involving Cloudflare (who, to date, have not
responded), or <a href="https://footnote4a.org/news/cyble-part2">Part II</a>, in which Cyble and Flock accuse me of phishing and
trademark infringement, you may want to read those parts first.</p>
<p>This morning, Cyble sent a follow-up notice to Hetzner, the German cloud provider currently hosting
this website. In it, they claim that this “website poses an immediate threat to public safety and
exposes law enforcement officers to danger, in clear violation of our client’s users’ rights and its
intellectual property rights.”</p>
<p>Cyble does not offer any evidence, nor any details regarding Flock’s apparently exclusive
intellectual property right on posing a threat to public safety.</p>
<h2>Part 2.5: Oops, I missed a part</h2>
<p><em>(Edit: December 29, 3:45 pm, Cornfield Standard Time)</em>: Apparently, I missed an attachment that was
sent along with <a href="https://footnote4a.org/news/cyble-part2">the first statement to Hetzner</a>. In the interest of fair
reporting, I decided to edit this post and include it here rather than burying it in an old post. I
want to be sure I provide an accurate view of the weight of the evidence presented by Flock, via
Cyble:</p>
<p><img src="https://footnote4a.org/blog/cyble-part3/globaleyez.jpg" alt="GlobalEyez Screenseal"></p>
<p>Don’t attempt to adjust your screen — they did, in fact, send it as a JPEG. The QR code contains the
text <code>https://haveibeenflocked.com/</code>.</p>
<p>The screenshot appears to show most of this website’s IP-address in the frontpage input box, with a
message saying it’s not a valid license plate.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> I have no idea why.</p>
<p>The text in the screenshot is a little hard to read because of the watermarking, but if you zoom in,
you’ll see the following notice:</p>
<p><img src="https://footnote4a.org/blog/cyble-part3/commercial.png" alt="&quot;Not for commercial use&quot;"></p>
<p><a href="https://www.globaleyez.net/en/">GlobalEyez</a> appears to be a Cologne-based “brand protection”
company that charges $20 for the “Screenseal” tool used here.</p>
<p>It’s a tool that certifies the integrity and authenticity of screenshots. You know, to be able to
prove in court that images are genuine; a higher standard than Flock applies to its own ALPR images.</p>
<p>It looks like that $20 was simply too much for Cyble (<a href="https://www.crunchbase.com/organization/cyble">$44.8M raised</a>) or a16z-backed
Flock (<a href="https://www.crunchbase.com/organization/flock-safety">$655.6M raised</a>) to bear. They pirated software to file a complaint about
intellectual property infringement.</p>
<h2>Part III: Cyble’s Second Attempt</h2>
<p>What follows is Cyble’s full second statement, as well as my response.</p>
<p>Hetzner’s email:</p>
<blockquote>
<p>Dear Mr van Pelt,</p>
<p>We have received an abuse report for your IP address 5.78.142.181.</p>
<p>This is the complainant’s answer:</p>
<hr>
<p>We are writing to update you on our complaint regarding this website, which presents a significant
security risk to our client and its users. The website poses an immediate threat to public safety
and exposes law enforcement officers to danger, in clear violation of our client’s users’ rights
and its intellectual property rights.</p>
<p>The website publicly and deliberately discloses extensive, sensitive information obtained from
Flock and its automated license plate reader (ALPR) systems with the apparent intent to undermine
law enforcement operations. It hosts three searchable databases that expose critical operational
intelligence. Such disclosure of sensitive data substantially heightens the risk to officers and
the public and necessitates urgent remedial action.</p>
<p>Please be informed that our client is a renowned company in US and directly works with govt
agencies.</p>
<p>Attached is the letter from our Client in support of the complaint for your reference.</p>
<p>In view of the above, kindly suspend the services and stop the hosting of the website at the
earliest convenience.</p>
<hr>
<p>We will need a reply from you within the next <em>24 hours</em>.</p>
</blockquote>
<h2>Response</h2>
<blockquote>
<p>Dear Hetzner,</p>
<p>The complainant’s latest response significantly shifts his allegations, effectively abandoning the
original claims of “phishing” and “trademark infringement.” He has now pivoted to vague,
unsubstantiated accusations regarding “public safety” and “intellectual property.”</p>
<p>The complainant refers to a “letter from our Client in support of the complaint for your
reference.” This letter was not included in the notice sent to me. I cannot respond to claims I
have not seen, and I request that Hetzner forward this document immediately if it is being used to
evaluate this complaint.</p>
<p>The complainant mischaracterizes the data on my website. These are not “sensitive information
obtained from Flock”; they are public records released by government agencies under state public
records laws. These records document the use of surveillance technology by public tax-funded
entities. The publication of such records is a protected journalistic activity.</p>
<p>As Mr. Siah points out, his alleged client “directly works with govt agencies.” Had any of these
agencies believed they were endangered by my speech, or that I am engaged in any criminal act such
as interfering with law enforcement operations, they would surely have knocked on my door.</p>
<p>Instead, Mr. Siah—who is not, to my knowledge, an attorney—asks you to accept an informal
complaint on behalf of his employer (Cyble), on behalf of their client (Flock), on behalf of an
unnamed agency allegedly “in danger” from information he has not identified, on a website he has
not meaningfully described. This is a transparent attempt to use a hosting provider’s phishing
complaint process to bypass the legal standards required for a court-ordered takedown—standards
Mr. Siah knows he could not possibly meet.</p>
<p>While the complainant also newly mentions “intellectual property rights,” he has failed to
identify any specific copyrighted material or patented technology being infringed. Mr. Siah
appears simply to be trawling through legal theories and accusations, hoping one will stick—an
ironic strategy for a complaint filed under “phishing.”</p>
<p>In summary, this complaint should be dismissed as frivolous. The complainant has failed to
identify any violation of Hetzner’s Terms of Service, any applicable law, or any actual abuse. If
the complainant or his alleged client, or <em>their</em> alleged government clients, wish to challenge my
exercise of free speech or my lawful publication of public records, avenues exist outside
Hetzner’s phishing complaint process.</p>
</blockquote>
<p>I will update this post when Hetzner responds. In the meantime, the site remains online, the public
records remain searchable, and the audit logs continue to tell stories the company would rather you
not read—like yesterday’s article on
<a href="https://footnote4a.org/news/amber-reasons">how 3,466 Flock searches failed to find a missing teen, while a woman at a Nebraska truck stop succeeded</a>,
or the newly-published logs showing a Texas officer justified a 30-day nationwide location history
lookup with the reason “<a href="https://footnote4a.org/profiling-records?q=gypsy&amp;sort=date_desc">gypsy crap</a>.”</p>
<h2 id="flock">Part III + ½: Support from Flock</h2>
<p>It turns out
<a href="https://footnote4a.org/blog/colwell-files/email.pdf">Flock already sent a statement in support of haveibeenflocked.com</a>
to its customers.</p>
<p>I forwarded it to Hetzner:</p>
<blockquote>
<p>Dear Hetzner,</p>
<p>Please find attached a customer communication from Flock Safety discussing my website—the same
website Cyble alleges “discloses extensive, sensitive information obtained from Flock.”</p>
<p>In this email, dated December 8, 2025, Chris Colwell, Flock’s Vice President of Solution
Engineering, writes to “provide factual context about what is happening”:</p>
<blockquote>
<p>Recently, a third-party website began aggregating search information that appears to have been
released through these public-records processes.</p>
</blockquote>
<p>And, under “What’s happening”:</p>
<blockquote>
<p>Based on what we have seen, websites like the one circulating online are using agency-released
public-records data.</p>
</blockquote>
<p>The email lists customer “concerns.” Causing “concerns” about government surveillance is a side
effect of legitimate, transparent reporting. It is neither “phishing,” nor a violation of
Hetzner’s Terms of Service.</p>
<p>Flock’s own communications confirm what I have stated from the outset: my website publishes
government records released through public records processes. This is protected journalism, not
“phishing.”</p>
<p>Nevertheless, nine days after Flock’s email, Cyble filed a phishing complaint with Hetzner.
Instead of presenting any evidence of any violation, Cyble made various unsupported allegations
about copyright and trademarks.</p>
<p>Flock knew the nature of my website before it sent Cyble to file the complaint. It was a
deliberate fabrication to shut down reporting on the company’s activities.</p>
<p>I ask again that this baseless complaint be dismissed. No evidence of any violation has been
presented, and the complainant’s own client has contradicted the allegations in writing.</p>
<p>I also respectfully suggest that Hetzner consider whether Cyble should remain a trusted source for
abuse reports, given their demonstrated willingness to misuse this process against legitimate
customers.</p>
<p>Finally, in the interest of transparency and potential further actions, I request that Hetzner
forward the attachment referenced—but not included—in the previous notification.</p>
</blockquote>
<p>Good looking out, Flock.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Because, unlike Flock’s “reason” field,
<a href="https://footnote4a.org/news/dupage-county-2">my inputs don’t accept arbitrary values</a>. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[3,466 Searches, Zero Hits: How Flock Failed an Amber Alert]]></title>
            <link>https://footnote4a.org/news/amber-reasons</link>
            <guid isPermaLink="false">https://footnote4a.org/news/amber-reasons</guid>
            <pubDate>Sun, 28 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Police searched Flock's license plate database over 3,000 times during a nine-week Amber Alert. The system had spotted the suspect before he even reached his target. In the end, a woman at a Nebraska truck stop did what billions of plate scans couldn't.]]></description>
            <content:encoded><![CDATA[<p>Being a “force multiplier” for finding missing children and acting on Amber alerts is perhaps the
most frequently cited reason for adopting Flock’s mass surveillance system. However, following an
Amber alert in Wisconsin, police in 23 states would search the Flock system over 2,000 times for the
wrong plate. Two months later, a woman spots the teen at a truck stop in Nebraska and calls in the
tip that would see her reunited with her parents.</p>
<p>In the summer of 2024, months before the amber alert, sixteen-year-old Sophia “did not return home
one night.” She kept in touch with her parents by phone and told them she was staying with a friend
in town. Her parents talked to local police and they decided not to report her as missing, believing
her to still be in the area.</p>
<p>In December that same year, police in Arkansas were performing a compliance check on Gary Day— a
forty-year-old man who was in the middle of a six year probationary sentence for endangering the
welfare of a minor.</p>
<p>Day’s charges stemmed from <a href="https://www.kait8.com/2019/10/18/baby-found-with-fractured-femur-couple-faces-charges/">his four-month-old baby being found with a fractured femur in
2020</a>. In 2023, he was charged with battering his then four-year-old son—those charges had
been dropped a few months prior to the December compliance check.</p>
<p>Police discovered Sophia when she attempted to escape out the backdoor. Although a condition of
Day’s probation was that he not leave Arkansas, Sophia told police that he had come to get her from
Wisconsin five months earlier. She was three months pregnant at the time of that interview.</p>
<p>Day was charged with interference with child custody and contributing to the delinquency of a minor
and released on bond, while Sophia was returned to her parents’ custody in Beaver Dam, Wisconsin.</p>
<p>A month later, Sophia’s parents contact Beaver Dam PD—they had caught Sophia messaging with Day
online. The parents share the contents of that conversation with police.</p>
<blockquote>
<p>“I stayed out past curfew. Probation. And didn’t notice. Im done. Fuck. Fucking ankle monitor is
flashing and vibrating”. — Gary Day message to Sophia</p>
</blockquote>
<p>Around 10 PM the next day a black Buick registered to Gary Day’s mother is spotted by a Flock camera
in southeast Missouri, heading north toward Wisconsin. It has Arkansas plate
<a href="https://footnote4a.org/surveillance/6ba9ae56">BBR 20L</a>.</p>
<p>The next morning, February 3 at 5:20 AM, Sophia’s sister spots the same car near their home. At 7:48
AM, their home surveillance system records Day walking near the house. At 8:30 AM, Day’s car is
spotted by WI DOT cameras. They capture the black Buick traveling southbound on Highway 151 near Sun
Prairie, WI. It has Pennsylvania plate <a href="https://footnote4a.org/surveillance/dbd326a9">KGW 5186</a>.</p>
<p>At an unspecified time that same day, Sophia’s father sends local police the surveillance footage
and reports the pregnant Sophia as missing. She was believed to have gone with Day — possibly to
Arkansas.</p>
<p>That evening, at 8:08 PM, an Amber Alert is broadcast. The alert includes information on the Buick,
and notes that it is “known to use multiple license plates,” listing Arkansas plate BBR 20L and
Pennsylvania plate KGW 5186.</p>
<p>After the alert is issued, numerous agencies inside and outside of Wisconsin, including Milwaukee’s
STAC<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> fusion center and the Missouri highway patrol, begin searches for Day’s Arkansas plate—
the first plate listed in the Amber alert, but not the plate he was most recently seen with.</p>
<p>The Pennsylvania plate seen on the Buick as it was leaving Wisconsin does not appear in search logs
until the next day around noon—more than 24 hours later—when the Beaver Dam, WI, PD decides to look
it up for the first time.</p>
<p>In total, the logs show 3,466 searches for the BBR 20L and KGW 5186 plate between February 3 and
March 27. Day and Sophia were found on April 2.</p>
<p>Sophia tells police she and Day had stayed at hotels in various locations. She testifies they
abandoned the Buick near a Culver’s in Avondale, Arizona. That particular Culver’s is right between
I-10 and a Park &amp; Ride facility. It seems like a plausible location to ditch a car, and explains why
a 16-year-old from Wisconsin would recall the name “Avondale.”</p>
<p>Based on Sophia’s accounting of the overnight stays, they would have been in Arizona on or around
February 8 or 9.</p>
<p>Milwaukee-based CBS 58 reports, however, that Sarpy County Sheriff Greg London, “learned the two had
hitchhiked with a trucker after <a href="https://www.youtube.com/watch?v=rfHqQE89NV8">Day’s car broke down in Idaho</a>.”</p>
<p>The <a href="https://footnote4a.org/blog/amber-reasons/2025CF000054-amended-complaint.pdf">criminal complaint</a> itself is highly detailed. To an extent. Although email
addresses and exact times for phone calls and license plate cameras are noted, it is conspicuously
vague about how and where the car was recovered.</p>
<p>It provides Sophia’s highly detailed, plausible-sounding statement, following it up with a single,
passive sentence, “law enforcement located the vehicle near that area.” There is no mention of who
located it, when it was located, or the condition it was located in.</p>
<p>It leaves open the possibility that the vehicle was flagged by the P&amp;R owner, or, if they left it at
Culver’s or at one of the hotels, a business owner, shortly after February 8.</p>
<p>The complaint is also silent on whether the license plates were recovered with the vehicle—a strange
omission for a prosecutor who is about to argue a flight risk exists based on those same plates.</p>
<p>A similarly vague incident occurs where the complaint includes Sophia’s statement that “they stopped
at an unknown Walmart in Missouri where Gary bought food using his EBT card.”</p>
<p>It does not specify which Walmart, or whether the electronic transaction, where a fugitive used a
government-issued benefit card, triggered an alert.</p>
<p>The prosecutor uses the same passive voice when she writes, “Gary Day and [Sophia] were located in
Sarpy County, Nebraska.”</p>
<p>Omitting that it was a woman at a truck stop who called it in.</p>
<p>After Nebraska police responded, they notified Beaver Dam PD that <a href="https://www.wbay.com/2025/04/03/missing-beaver-dam-teen-sophia-franklin-found-amber-alert-canceled/">Sophia had been found on April 2,
at 11:40 PM</a> — after WISN 12 ran an item marking <a href="https://www.youtube.com/watch?v=Rr-YpIIc-9s">Sophia’s 17th birthday</a>.</p>
<p>Below are the searches of the Flock system during the nine-week manhunt.</p>
<div class="chart-placeholder" data-chart="amber-alert-searches"></div>
<div class="chart-placeholder" data-chart="amber-alert-daily"></div>
<p>They don’t tell a story of a system that is effective at locating missing children.</p>
<p>A man transported a child across state lines without her parents’ knowledge and got her pregnant.</p>
<p>While he is on probation.</p>
<p>Then, a few months later, he does the same thing <em>again</em>.</p>
<p>Flock’s system spots him <em>in a state he is not supposed to be in</em>, and <em>before he gets to
Wisconsin</em>.</p>
<p>There is no Amber alert yet, so Flock does not detect this.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<p>At the time Flock spots Day’s car in Missouri, he is either still wearing his ankle monitor, or he
removed it.</p>
<p>He gets to Wisconsin, to the home of someone he has a no-contact order for.</p>
<p>No-contact orders aren’t automatically placed in Flock’s system—no alert is sent.</p>
<p>His car is spotted with a different plate mere hours after he is spotted violating both the
no-contact order and his probation.</p>
<p>Not by a Flock camera, but by a DOT camera. That plate, however, is not used for lookups until more
than a day later.</p>
<p>Police effectively stop searching only days after the alert is broadcast.</p>
<p>When Sophia is ultimately found, it’s not through Flock, or any other form of digital
surveillance.<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup></p>
<p>Day’s ankle monitor being cut off or leaving the state could have triggered a reaction from Arkansas
probation or Wisconsin authorities on February 2—before he ever reached Sophia’s home in Beaver Dam.</p>
<p>When that monitor tripped, police could have manually placed a hotlist entry in the system.</p>
<p>The EBT transaction also could have sent police directly to a specific Walmart, where Day and Sophia
were standing at the register.</p>
<p>In the nine weeks the Amber Alert was active, billions of license plates—<a href="https://www.nbcnews.com/tech/tech-news/flock-police-cameras-scan-billions-month-sparking-protests-rcna230037">approximately forty
billion plates</a> by Flock alone—and financial transactions were entered into police
databases, on the promise that they are a “force multiplier” to find missing children like Sophia.</p>
<p>In the end, the only effective force multiplier was a woman at a truck stop in Nebraska who paid
attention to the news and the people around her.</p>
<h2>Additional Reporting</h2>
<ul>
<li><a href="https://www.jsonline.com/story/news/2025/02/05/beaver-dam-amber-alert-man-faces-felonies-in-missing-girl-case/78246544007/">https://www.jsonline.com/story/news/2025/02/05/beaver-dam-amber-alert-man-faces-felonies-in-missing-girl-case/78246544007/</a></li>
<li><a href="https://www.jsonline.com/story/news/crime/2025/02/07/amber-alert-arkansas-man-connected-to-missing-beaver-dam-wisconsin-teen-convicted-of-harming-child/78326952007/">https://www.jsonline.com/story/news/crime/2025/02/07/amber-alert-arkansas-man-connected-to-missing-beaver-dam-wisconsin-teen-convicted-of-harming-child/78326952007/</a></li>
<li><a href="https://www.wisn.com/article/beaver-dam-amber-alert-for-16-year-old-girl-extended-to-arkansas/63692596">https://www.wisn.com/article/beaver-dam-amber-alert-for-16-year-old-girl-extended-to-arkansas/63692596</a></li>
<li><a href="https://www.kare11.com/article/news/nation-world/police-continue-amber-alert-search-pregnant-wisconsin-teen/89-1d5266cb-555c-42e4-a587-eb8418c292be">https://www.kare11.com/article/news/nation-world/police-continue-amber-alert-search-pregnant-wisconsin-teen/89-1d5266cb-555c-42e4-a587-eb8418c292be</a></li>
<li><a href="https://www.youtube.com/watch?v=aOet6Sv9sb0">https://www.youtube.com/watch?v=aOet6Sv9sb0</a></li>
<li><a href="https://www.wmtv15news.com/2025/04/03/missing-beaver-dam-teenager-found-safe-after-nearly-two-months/">https://www.wmtv15news.com/2025/04/03/missing-beaver-dam-teenager-found-safe-after-nearly-two-months/</a></li>
</ul>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Southeastern Wisconsin Threat Analysis Center <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Proactive hotlisting of thousands is a constitutional rot, but reactive surveillance marketed as
a “force multiplier” is a commercial fraud. On February 2, Flock’s system silently recorded a
documented predator in Missouri, doing nothing because the paperwork of an Amber Alert hadn’t
yet caught up to the reality of the crime. Selling a dragnet on the promise of child safety,
while it functions only as a digital archive of failures, is a cynical exploitation of public
trauma to bypass privacy concerns. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>It is a virtual certainty that police obtained access to Day’s and Sophia’s electronic accounts. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>audit-log-analysis</category>
        </item>
    </channel>
</rss>