<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Footnote4a — Investigations</title>
        <link>https://footnote4a.org/category/investigations</link>
        <description>Footnote4a reporting filed under Investigations</description>
        <lastBuildDate>Sat, 18 Apr 2026 18:30:00 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>https://github.com/jpmonette/feed</generator>
        <language>en</language>
        <copyright>© 2026 Footnote4a — Investigations</copyright>
        <atom:link href="https://footnote4a.org/feed/investigations.xml" rel="self" type="application/rss+xml"/>
        <item>
            <title><![CDATA[The Cost of Being Alive: Flock CEO Langley at TED2026]]></title>
            <link>https://footnote4a.org/news/langley-ted2026</link>
            <guid isPermaLink="false">https://footnote4a.org/news/langley-ted2026</guid>
            <pubDate>Sat, 18 Apr 2026 18:30:00 GMT</pubDate>
            <description><![CDATA[Flock's CEO told a $12,500-a-seat TED audience that in South Africa, "crime is simply the cost of being alive." His own company is helping keep it that way.]]></description>
            <content:encoded><![CDATA[<p>Flock’s CEO spoke at “TED2026: All of Us” (<a href="https://archive.vn/Dxn7l">Police1 transcript (archive)</a>). Attendees with a
$12,500 “Standard” membership (or higher) had applied to hear Langley speak about equity in police
surveillance. Instead, he made the case against his own company in three distinct ways.</p>
<h2>“Every city has a right”</h2>
<blockquote>
<p>America is built on principles of freedom, and every city has a right to make that choice. When a
community pulls back on public safety they achieve less surveillance, but the people who are made
to suffer aren’t the affluent ones, it’s the people who live in neighborhoods where they can’t
afford safety…</p>
</blockquote>
<p>“[E]very city has a right to make that choice” is Langley flat-out catering to his customer base.
The U.S. Constitution — specifically the Fourth Amendment — as well as many state constitutions are
intended to constrain government. Local governments don’t have unlimited power.</p>
<p>The other issue here is that “the people who live in neighborhoods” are left out of the conversation
and the decision to deploy surveillance entirely. They suddenly discover “LPR” cameras pointed at
their basketball court because Flock’s own sales pitch — second image below — says these deployments
are a way for departments to get video surveillance without having to go through a public hearing.</p>
<div class="grid grid-cols-2 items-center gap-x-2">
  <img src="https://footnote4a.org/blog/speed-cameras/park-lpr.jpeg"
       alt="Set of Flock LPR cameras facing basketball and pickleball courts">
  <img src="https://footnote4a.org/blog/speed-cameras/wing-live.webp" alt="Live video without approval">
</div>
<p>“Flock LPR” cameras are named to trick people into believing they’re license plate readers. Instead,
they capture video and data to be fed into a sprawling national system centered on Flock’s “Nova”
intelligence product.</p>
<p>In Langley’s world, the cops get to choose. The people aren’t even told.</p>
<h2>Safety-as-a-Service (for a Recurring Fee)</h2>
<blockquote>
<p>South Africa has over 600,000 private security guards. More than its police and military combined.
The wealthy live behind nine-foot walls and electric fences. Safety exists, if you can afford it.
If you can’t, crime is simply the cost of being alive.</p>
</blockquote>
<p>The true hypocrisy, however, is not the price tag for “All of Us”, but the invocation of South
Africa’s “pay to stay safe” system. Langley cites it as an example of inequality; at the same time,
<a href="vumacam-flock">Flock partners with the South African company Vumacam</a> to profit off the creation of
a new era of “<a href="https://www.technologyreview.com/2022/04/19/1049996/south-africa-ai-surveillance-digital-apartheid/">digital apartheid</a>” in South Africa.</p>
<div class="not-prose">
    <img src="https://footnote4a.org/blog/vumacam-flock/partner-linkedin-image.png"
        alt="Partner Event image with Flock and Vumacam"
        class="mx-auto w-[500px]">
    <div class="text-sm text-center w-full italic">
    Via Ricky Croock's LinkedIn (spelled as "Ricky Crook" here).
    </div>
</div>
<p>Vumacam places Flock cameras in affluent suburbs and sells that data to private security
contractors. Those corporations, which are even less accountable than the government, in turn sell
their services to South Africa’s upper-class.</p>
<p>Langley stands on-stage in feigned indignation, as his <a href="https://techstartups.com/2026/04/17/flock-safety-hits-8-4b-valuation-as-ai-powered-police-tech-sparks-nationwide-protests/">$8.4 billion company</a> collects on “the
cost of being alive.”</p>
<h2>The Digital Standing Army</h2>
<p>Langley lauds police forces in other countries and considers the U.S. system of local police to be a
“unique problem we have created for ourselves”. He is wrong. It’s not a problem, but a solution.</p>
<p>The founding generation was deeply divided on standing armies. At the time, the local militia kept
the peace — professional police didn’t arrive in the U.S. until 1838. A common wisdom was that the
more local the militia, the less likely it would be to turn on the people.</p>
<p>What the founders feared from a standing army has arrived in a different form: increasingly
militarized and high-tech police. Langley describes his vision as one where any police officer
anywhere in the country can “share” and “cooperate” across borders and jurisdictions.</p>
<p>What that means in practice is that any police department in the nation has the capability to
dispatch one of Langley’s drones based on reports from his national “Nova” system, fed by hundreds
of thousands of his cameras.</p>
<p>Even Hamilton, a proponent of standing armies, <a href="https://founders.archives.gov/documents/Hamilton/01-04-02-0160">warned</a> that nations attached to liberty will,
in time, give up freedom for safety — a dynamic that scales down to any institution sold as
protection.</p>
<p>Police now believe they depend on Flock. That means its CEO can not only afford safety — he can
demand it from the standing army he helped create.</p>
<h2>What to do about it</h2>
<p>The camera on your corner was approved by someone. Find out who, and when they’re up for election.</p>
<ul>
<li><a href="https://footnote4a.org/pd">Check whether your city uses Flock</a>.</li>
<li>Request public records for contracts, data-sharing and demo agreements, and <a href="https://footnote4a.org/about/audit-logs">log
files</a>.</li>
</ul>
<p>Public hearings and records requests are the only reason any of this is visible at all. Keep
showing up.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock Goes Global: How a $7.5 Billion Surveillance Company Found Its International Partner in South Africa's Most Controversial Camera Network]]></title>
            <link>https://footnote4a.org/news/vumacam-flock</link>
            <guid isPermaLink="false">https://footnote4a.org/news/vumacam-flock</guid>
            <pubDate>Sun, 05 Apr 2026 18:00:00 GMT</pubDate>
            <description><![CDATA[Vumacam sells Flock surveillance in South Africa. Its founder was criminally investigated for operating unlicensed cameras. Its cameras have been called digital apartheid. It all tracks.]]></description>
            <content:encoded><![CDATA[<p>Flock Safety has spent the last year telling American cities that its surveillance network is
accountable, auditable, and locally controlled. Cities have <a href="https://www.npr.org/2026/02/17/nx-s1-5612825/flock-contracts-canceled-immigration-survillance-concerns">canceled contracts</a>. Citizens have
<a href="https://techcrunch.com/2026/02/23/americans-are-destroying-flock-surveillance-cameras/">cut down camera poles</a>. The ACLU has been <a href="https://www.aclu.org/news/privacy-technology/flock-pushback">publishing investigations</a>. The EFF has
<a href="https://www.eff.org/deeplinks/2025/12/effs-investigations-expose-flock-safetys-surveillance-abuses-2025-review">catalogued abuse</a>.</p>
<p>The company got caught <a href="overseas-data">sending data to Upwork contractors</a> and
<a href="dps-denmark">Denmark</a>. The CEO <a href="staunton-attack">declares Flock is under attack</a>. The <a href="trust-me-bro">CISO
denies</a> high-profile, <a href="never-hacked-facts">very real security issues</a>. The permit
manager installs <a href="riverside-permits">cameras without adequate permits in California</a>,
<a href="dot-permits">Iowa</a>, and other states. The VP of Solution Engineering <a href="colwell-files">redacts information from log
files</a>. The Chief Legal Officer appears on <a href="racist-cops">niche livestreams</a>. And
marketing, seemingly sponsored by the City of Dunwoody, <a href="drone-as-dataleak">pumps out questionable
videos</a>.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>You’d think Flock has enough to worry about at home. Now it’s going international.</p>
<p>We already know what Flock’s jurisdictional sprawl looks like domestically. The Virgin Islands
Police Department — a Caribbean territory under an active DOJ consent decree for unconstitutional
policing — <a href="vi-ar">was caught querying Flock cameras in Rogers, Arkansas</a> for stolen vehicles and
traffic violations. No one in Flock’s 5,000+-agency network — including Flock and the state agencies
responsible for criminal justice information — has flagged that absurdity.</p>
<p>Now take that indifference and remove the American legal framework entirely.</p>
<p>Flock’s first(?) international reseller is Vumacam. A Johannesburg-based company that has
been accused of building a digital apartheid, charged by regulators for operating without a license,
and caught making false claims under oath about data protection compliance.</p>
<p>Sounds about right.</p>
<h2>The Partner: Ricky Croock</h2>
<p>Flock’s partner page lists Vumacam as a “channel provider”:</p>
<blockquote>
<p>Vumacam is Flock Safety’s reseller partner in South Africa. The partnership extends Flock’s
technology internationally, fostering safer communities abroad.</p>
</blockquote>
<div class="not-prose">
    <img src="https://footnote4a.org/blog/vumacam-flock/partner-linkedin-image.png"
        alt="Partner Event image with Flock and Vumacam"
        class="mx-auto w-[500px]">
    <div class="text-sm text-center w-full italic">
    Via Ricky Croock's LinkedIn (spelled as "Ricky Crook" here).
    </div>
</div>
<p>Vumacam operates a network of over 7,000 cameras across South Africa’s Gauteng province — the
majority concentrated in Johannesburg. The company was founded by Ricky Croock, a former private
security operator who previously ran CSS Tactical, a company providing armed response, guarding, and
CCTV services.</p>
<p>If you thought the Flock model couldn’t get worse: Croock found a way. Vumacam builds and maintains
the camera infrastructure — poles, cameras, connectivity — and then sells access to private security
companies, who pay a monthly fee for video feeds in their patrol areas.</p>
<p>The network includes over 2,000 automatic license plate recognition cameras that, as of 2021,
scanned an estimated 9.68 million vehicle registrations per day. That figure has likely grown
substantially alongside the network’s expansion to 7,000 cameras.</p>
<p>If this sounds like Flock, that’s because it is.</p>
<h2>Croock and Vumacam’s History</h2>
<p>The critical reporting on Vumacam is extensive, spanning investigations by MIT Technology Review,
Daily Maverick, VICE, and the Pulitzer Center.</p>
<h3>Operating Without Registration</h3>
<p>South Africa’s Private Security Industry Regulatory Authority (PSIRA) <a href="https://www.citizen.co.za/lifestyle/entertainment/who-watches-big-brother-joburgs-private-surveillance-cameras-come-under-fire/">charged both Vumacam and
Croock personally</a> with a code of conduct violation for operating a security business while
unregistered with the authority.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> Police opened a parallel criminal investigation. Vumacam
subsequently registered, but PSIRA confirmed both the criminal case and the code of conduct probe
remained active.</p>
<p>For a company building a city-wide surveillance network, the sequence is notable: deploy first,
register later. <a href="speed-cameras">Flock has its own version of this approach</a> where hundreds of
cameras were installed on public roads without permits across Florida, Illinois, South Carolina,
Texas, and North Carolina, with an Illinois DOT official receiving a thinly veiled threat that Flock
would send “<a href="https://www.jalopnik.com/license-plate-surveillance-startup-broke-the-law-while-1851289764/">about 30 different police chiefs</a>” to the office if permits weren’t
fast-tracked. And that’s just the states that have taken some form of action.</p>
<h3>Lying Under Oath</h3>
<p>In a sworn affidavit to the Gauteng High Court, Croock stated that Milestone VMS — the video
management software Vumacam uses — was “certified GDPR-compliant under the General Data Protection
Regulation applicable under European Union law.” <a href="https://www.dailymaverick.co.za/article/2021-09-25-vumacams-hundreds-of-thousands-of-cameras-will-be-watching-you/">Daily Maverick’s investigation</a> found this
was not true. EuroPriSe, the certification body, had not officially accredited Milestone; the
application was still pending.</p>
<p>Croock also told the court that Milestone “ensures responsible use of data by end users.”
Milestone’s documentation says the opposite: users, not the software, bear responsibility for
compliance.</p>
<p>We’ve heard these types of assertions before. Flock’s CEO Garrett Langley told the public that Flock
had no federal contracts. That was <a href="the-platform">also not true</a>. Flock was running a pilot program
giving Customs and Border Protection and ICE direct access to data from its cameras. After
information about the program became public, Flock stated it shut it down, but quietly continued to
run it.</p>
<p>And, of course, Flock has also <a href="never-hacked-facts">claimed all sorts of compliance</a>, including
compliance with HECVAT, which is a <a href="staunton-attack">vendor evaluation form</a>, and CJIS ACE — a
commercial certificate, every bit as valid as the official <a href="https://ko-fi.com/s/b75c5f1286">Certified Privacy Advocate
Certificate</a> from <a href="http://haveibeenflocked.com">haveibeenflocked.com</a>.</p>
<h3>“We don’t track people or cars”</h3>
<p>Exactly like Flock claims in the US, Vumacam has publicly claimed its system “does not track people
or cars.” <a href="https://www.dailymaverick.co.za/article/2021-09-08-heres-how-johannesburg-security-cameras-track-you/">The company’s marketing materials</a> also echo Flock’s — which makes sense, given it
is a reseller — and show that the system can retrospectively map a vehicle’s complete movements over
30 days. Precisely the definition of tracking.</p>
<p>Private security companies can add registration numbers to watchlists without court orders. Police
can request location data through private security databases without subpoenas or warrants.</p>
<p>That’s true in America and South Africa.</p>
<h3>Digital Apartheid</h3>
<p>The “digital apartheid” criticism is the most damning line of criticism against Vumacam, and it’s
also the most structurally relevant to understanding what Flock’s technology does, both
domestically and abroad.</p>
<div class="not-prose">
    <img src="https://footnote4a.org/blog/vumacam-flock/safecity-cam.png"
        alt="A SafeCity pole in Sandton, in northern Johannesburg."
        class="mx-auto max-w-full">
    <div class="text-sm text-center w-full italic">
    A SafeCity pole in Sandton, in northern Johannesburg.
    </div>
</div>
<p>Vumacam deployed its cameras almost exclusively in affluent, predominantly white suburbs of
Johannesburg because that’s where paying customers were. Poor Black townships were left uncovered,
not out of principle, but because there was no revenue model — nobody hires ADT or other security
companies there. The result is a surveillance geography that maps onto apartheid-era spatial
divisions with uncomfortable precision.</p>
<p>Flock declines to release its camera locations and many cities have refused to release Deployment
Plans and other documentation. Efforts like <a href="https://deflock.org">Deflock</a> are underway and are
beginning to draw Flock devices on the same maps as America’s apartheid-era <a href="https://dsl.richmond.edu/panorama/redlining/">redlined
districts</a>.</p>
<p>A leaked shift report from Fibrehoods, a Vumacam partner, <a href="https://www.technologyreview.com/2022/04/19/1049996/south-africa-ai-surveillance-digital-apartheid/">documented 14 incidents flagging 28
people as “suspicious.”</a> — a term that’s <a href="https://footnote4a.org/reason-cloud">commonly found in Flock logs</a> as a
<a href="search-reasons">“justification” for retrieving 30-day location histories</a>. All 28 “suspicious”
persons in the shift report were Black. The suburbs in question were majority-white.</p>
<p>Michael Kwet, a visiting fellow at Yale Law School who studies the South African surveillance
industry, <a href="https://www.vice.com/en/article/smart-cctv-networks-are-driving-an-ai-powered-apartheid-in-south-africa/">drew a direct line</a> to the apartheid-era <em>dompas</em> — the internal passport system
that restricted Black people’s movement in white enclaves. Vumacam (x Flock)'s AI-powered camera
network recreates this digitally: Black residents in historically white suburbs are surveilled,
flagged, and tracked.</p>
<p>Police in the US say they need Flock <a href="racist-cops">to stop them from pulling Black people out of cars at
gunpoint</a>. South Africa shows what actually happens when surveillance infrastructure is
deployed by private companies in a society with deep racial stratification.</p>
<p>Intent is irrelevant. The business model is what matters.</p>
<h2>Why This Partnership Matters</h2>
<p>Flock’s domestic troubles are well-documented on this site and elsewhere. Secret data sharing,
<a href="the-platform">secret employee access to camera networks</a>, cameras installed <a href="riverside-permits">without
permits</a>, a CEO who <a href="https://www.aclu.org/news/privacy-technology/flock-ceo-goes-ballistic">goes ballistic</a> rather than address concerns, and
these types of hits keep on coming while the company only offers empty promises through increasingly
snazzy marketing videos.</p>
<p>The Vumacam partnership introduces something new. The <a href="vi-ar">Virgin Islands querying Arkansas
cameras</a> was a preview — absurd, unmonitored, jurisdictionally incoherent, but still
technically domestic. It’s the diet version of what’s happening in South Africa.</p>
<p>In the United States, Flock’s surveillance network technically operates within — however loosely and
poorly enforced — a framework of Fourth Amendment protections, state privacy laws, US DoJ policies,
FOIA requests, city council votes, and the kind of public pressure that gets contracts canceled.</p>
<p>In South Africa, Vumacam successfully sued the Johannesburg Roads Agency when the agency tried to
suspend its camera permits, and the court ruled that <a href="https://www.cliffedekkerhofmeyr.com/en/news/publications/2020/dispute/Dispute-Resolution-Alert-20-October-2020-Administrative-bodies-Stay-in-your-lane-.html">the JRA’s job was to protect road
infrastructure, not human rights</a>. No civil society organization has brought a subsequent case.
The Information Regulator’s investigation into POPIA compliance appears to have produced no public
enforcement action.</p>
<p>Flock gets to sell its technology into this environment through a reseller. It is insulated from
direct accountability while Vumacam gets access to the surveillance platform of a $7.5 billion
company backed by Andreessen Horowitz and Founders Fund.</p>
<p>Vumacam wants to be Flock as much as Flock wants to be Vumacam.</p>
<h2>The Response</h2>
<p>SafeCity — featured in the backdrop for the event photo where Flock, Matrix, and Vumacam promote the
partnership — is Vumacam’s premium product tier. It is the pitch to government. In February 2024,
Vumacam announced a partnership with the Gauteng provincial government giving officials access to a
network of over 6,000 cameras and “advanced crime-fighting technologies.”</p>
<p>Response times dropped, the company says, from 18–30 minutes to 5–10 minutes.</p>
<p>Last month, in March 2026, apartheid police commander Eugene de Kock, nicknamed “Prime Evil”
<a href="https://apnews.com/article/south-africa-apartheid-killings-inquiry-police-ce81c4459c4685d3680d6543e075c30d">testified in court</a> about the atrocities he committed in the name of public safety.</p>
<p>Now, South Africa evaluates a high-tech mass surveillance network that replicates apartheid-era
movement controls and lack of oversight that let <em>Prime Evil</em> act with impunity when his
security forces <a href="https://apnews.com/article/apartheid-south-africa-killings-cradock-four-51e910faa6bc7251f081ec5eb97c601e">abducted, tortured and killed activists</a>.</p>
<p>When Flock’s critics — “activists” mounting a “coordinated attack” <a href="staunton-attack">according to its
CEO</a> — warn about what happens when surveillance infrastructure scales without
democratic oversight, they don’t speak in hypotheticals.</p>
<p>Johannesburg proves the outcome: Apartheid 2.0, powered by Flock.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>There will be more in the future, if Flock’s Indeed page is anything to go by. The
company is looking to hire a salaried ($135k–$160k p.a.), Los Angeles-based “Sr. Producer”: “As
Flock’s video output continues to grow in volume, ambition, and operational complexity, the
Senior Film Producer role is responsible for owning all pre-production and on-site production
logistics that make high-quality video possible.” <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Flock did similar in <a href="https://www.newsobserver.com/news/state/north-carolina/article290872709.html">North Carolina</a> and <a href="https://www.houstonchronicle.com/news/houston-texas/article/flock-camera-investigation-22096147.php">Texas</a>, and continues
to operate without required licenses in states like Iowa. US regulators are seemingly not as
effective as South Africa’s. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA["Flock Wing License(s) Included": How Speed Cameras Became Surveillance Cameras]]></title>
            <link>https://footnote4a.org/news/speed-cameras</link>
            <guid isPermaLink="false">https://footnote4a.org/news/speed-cameras</guid>
            <pubDate>Fri, 27 Mar 2026 14:00:00 GMT</pubDate>
            <description><![CDATA[Procurement records reveal how Flock Safety sneaks its cameras into school zones with zero data governance provisions in the contract.]]></description>
            <content:encoded><![CDATA[<p>In Florida, every time a parent drops off a child at a Hillsborough County school zone, RedSpeed
cameras capture continuous HD video of their vehicle. The footage is fed, via <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> stream, directly
into Flock Safety’s national surveillance network where it is processed by Flock’s AI, stored on
Flock’s terms, and made searchable by thousands of agencies nationwide.</p>
<p>The contract governing this arrangement contains no data retention policy for the surveillance
layer, no restrictions on who can access it, no privacy provisions for the people being filmed, and
not even a reference to Flock’s terms of service. The word “privacy” does not appear — except once,
regarding credit card processing when subjects pay for the privilege of their surveillance.</p>
<p>The pricing page of RedSpeed’s winning proposal says it plainly: <strong>“Flock Wing License(s)
Included.”</strong></p>
<p><img src="https://footnote4a.org/blog/speed-cameras/proposal-pricing.png" alt="RedSpeed pricing page — &quot;Flock Wing License(s)&quot;"></p>
<h2>What Hillsborough County Bought</h2>
<p>In 2024, the Hillsborough County Sheriff’s Office solicited proposals for automated speed
enforcement in school zones (RFP 2024-003). RedSpeed Florida won the contract. Its 80-page proposal
made the Flock integration central to its pitch.</p>
<p>On page 5, a letter on Flock Safety letterhead, signed by Todd Troutman, Senior Accounts, confirms
the partnership:</p>
<blockquote>
<p>Flock Safety and Redspeed have partnered together to support many different agencies. Flock Safety
is able to provide an additional layer of software to the Redspeed cameras (speed and red light).
This allows the Redspeed cameras to be turned into ALPRs that push images into Flock Safety’s
cloud and allow agencies with access to those cameras to search for vehicles.</p>
<p>…</p>
<p>In order for the two systems to work together, Redspeed will provide Flock with <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> streams for
the given cameras. From there, Flock Safety will integrate the camera stream into the Flock system
thus allowing the software to be on the camera, turning it into an ALPR. The camera is then
plotted on the Flock Safety map in the application to appropriately locate where the cameras are.</p>
<p>…</p>
<p>As of March 2024, Redspeed is the only company with whom Flock has partnered with to offer Wing
LPR integration on school zone enforcement and/or red light cameras.</p>
</blockquote>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/flock-letter-to-redspeed.pdf" class="collapsible">Flock Safety Letter to RedSpeed (from HCSO RFP 2024-003)</a></p>
<p>RedSpeed’s transmittal letter was even more direct:</p>
<blockquote>
<p><strong>ONLY RedSpeed can offer integration with Flock.</strong> We have enclosed a letter from Flock
confirming this fact. We have collaborated closely with Flock to optimize interoperability… We
have <strong>successfully integrated over 100 Flock systems</strong> in current installations; our competitors
have integrated zero Flock systems. Only RedSpeed offers this direct integration, and <strong>Flock is
included in the RedSpeed price. Integrated Flock means RedSpeed’s cameras are feeding the Wing
System for enforcement synergy.</strong> It also means fewer poles and solar panels.</p>
</blockquote>
<p>Enforcement. Synergy.</p>
<p><img src="https://footnote4a.org/blog/speed-cameras/proposal-flock-claims.png" alt="RedSpeed transmittal — Flock integration claims" class="collapsible"></p>
<p>RedSpeed’s proposal includes a competitive comparison table highlighting “True integration with
Rekor/Flock/Vigilant” as a checkmark for RedSpeed and a red “denied” for “All Competitors.”</p>
<p><img src="https://footnote4a.org/blog/speed-cameras/proposal-table1.png" alt="RedSpeed Table 1 — competitive comparison"></p>
<p>The proposal emphasizes that RedSpeed cameras deliver “lane-specific, high resolution (3000x5000
pixels, 30 frames per second), video cameras” — and that RedSpeed “provides the ability to live
stream video from all cameras (no still cameras).” It also states that RedSpeed “provides at least
45 days of storage” and “Flock ALPR at all locations, included in the RedSpeed Price.”</p>
<p><img src="https://footnote4a.org/blog/speed-cameras/proposal-camera-tech.png" alt="RedSpeed camera technology section" class="collapsible">
<img src="https://footnote4a.org/blog/speed-cameras/proposal-approach.png" alt="RedSpeed understanding and approach summary" class="collapsible"></p>
<p>RedSpeed’s stake in all this is straightforward. It offers a “turnkey” service — everything from
taking a picture to swiping a credit card — for “35% of the Governing Body’s Statutory share of
collected revenue.” In Hillsborough County alone, more than 105,000 violations have been issued
since fall 2024, generating over $6 million in paid fines; <a href="https://www.wptv.com/wptv-investigates/florida-school-speed-zone-cameras-ripping-drivers-off-says-county-magistrate-who-ruled-on-hundreds-of-cases">a local magistrate called it a rip-off</a>.</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/redspeed-proposal-hcso.pdf" class="collapsible">RedSpeed Full Proposal — HCSO RFP 2024-003 (80 pages)</a></p>
<p><img src="https://footnote4a.org/blog/speed-cameras/proposal-pricing-letter.png" alt="Flock letter placement after pricing section"></p>
<p>In Alpharetta, GA, it was structured a little different: the county <a href="https://patch.com/georgia/alpharetta/speed-detection-cameras-approved-alpharetta-school-zones">had to pay 2% extra to give the
data to
Flock</a>.
Maybe that’s Georgia-based Flock’s home field advantage at play.</p>
<h2>The Silent Contract</h2>
<p>What matters most about the Hillsborough procurement is what the contract <em>doesn’t</em> say.</p>
<p>The HCSO-RedSpeed contract consists of three incorporated documents:</p>
<ol>
<li>The RFP solicitation (HCSO RFP 2024-003, 39 pages)</li>
<li>The draft contract template (11 pages)</li>
<li>RedSpeed’s proposal (80 pages, including the Flock letter)</li>
</ol>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/hcso-rfp-2024-003.pdf" class="collapsible">HCSO RFP 2024-003 — Final Solicitation</a>
@<a href="https://footnote4a.org/blog/speed-cameras/hcso-draft-contract.pdf" class="collapsible">HCSO RFP 2024-003 — Draft Contract</a></p>
<h3>The Request for Proposals</h3>
<p>The RFP explicitly required ALPR capability (Part D, Section 3):</p>
<blockquote>
<p>Qualified, proposing firms must demonstrate competence and experience with Automated Speed
Enforcement Systems and Automated License Plate Reader systems</p>
</blockquote>
<p>It required video, not stills (Part C, Section 3.A):</p>
<blockquote>
<p><strong>Video Technology is required. Still shots are not acceptable.</strong> Respondent proposer must utilize
radar and/or laser automated speed detection systems.</p>
</blockquote>
<p>And it required subcontractor disclosure (Part B, Section 5):</p>
<blockquote>
<p>If a Proposer intends to use subcontractors, the Proposer must <strong>identify in the Proposal the
names of the subcontractors and the portions of the work</strong> the subcontractors will perform.</p>
</blockquote>
<p><img src="https://footnote4a.org/blog/speed-cameras/rfp-alpr-requirement.png" alt="RFP Part D — ALPR requirement" class="collapsible">
<img src="https://footnote4a.org/blog/speed-cameras/rfp-video-required.png" alt="RFP Part C — Video required, stills not acceptable" class="collapsible">
<img src="https://footnote4a.org/blog/speed-cameras/rfp-subcontracting.png" alt="RFP Part B — Subcontractor disclosure requirement" class="collapsible"></p>
<p>What was not in the RFP were any specifications for how ALPR data should be governed, stored,
retained, shared, or deleted.</p>
<h3>What the draft contract covers</h3>
<p>The draft contract is an 11-page template with fill-in-the-blank fields. It covers: term (3 years +
three 1-year extensions), insurance requirements, E-Verify compliance, subcontracting (generic),
public records obligations (per Florida § 119.0701), indemnification, and confidentiality — but
only of “Sheriff Operations” (Section 23).</p>
<h3>What the draft contract does NOT cover</h3>
<ul>
<li>Data retention for ALPR/LPR captures</li>
<li>Data sharing restrictions (who can access Flock’s system)</li>
<li>Privacy policy for citizens whose vehicles are scanned</li>
<li>Flock Safety’s terms of service or Master Service Agreement</li>
<li>Any reference to Flock’s default data practices (30-day rolling delete, Section 4.3 perpetual
anonymized data license, Section 5.3 law enforcement disclosure rights)</li>
<li>Ownership of ALPR data (distinct from violation/citation data)</li>
<li>Audit rights over the ALPR system</li>
<li>Restrictions on out-of-state or federal agency access</li>
<li>Any framework governing the surveillance layer at all</li>
</ul>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/flock-default-msa-oakland.pdf" class="collapsible">Flock Default MSA — Oakland CA, Sept 2025</a></p>
<p>Nothing in the contract says HCSO gets any rights to the video or the ALPR data. If HCSO wants to
access that, they presumably have to do what anyone else can do: pay Flock and <a href="own-nothing">ask
nicely</a>.</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/sfist-sfpd-flock-federal.pdf" class="collapsible">SFist — SFPD Flock Data Accessed 1.6M Times by Federal Agencies</a>
@<a href="https://footnote4a.org/blog/speed-cameras/aclu-flock-data-sharing.pdf" class="collapsible">ACLU — Flock Can Share Data Even When PDs Opt Out</a></p>
<p>The sheriff’s RFP was specific enough to guarantee the desired outcome. The final tabulation sheet
published by HCSO shows RedSpeed with the highest evaluation score of 95.95, ahead of Blue Line
Solutions (91.75) and Conduent (77.6).</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/hcso-tabulation-sheet.pdf" class="collapsible">HCSO RFP 2024-003 — Tabulation Sheet</a>
@<a href="https://footnote4a.org/blog/speed-cameras/cl-tampa-flock-speed-cameras.pdf" class="collapsible">Creative Loafing Tampa — Flock Integrated Speed Cameras in School Zones</a></p>
<h2>Wing: The Platform That Turns Any Camera Into a Flock Camera</h2>
<p>RedSpeed’s pitch works because of Wing: Flock’s product line for converting third-party cameras into
Flock surveillance nodes. The branding is a somewhat confusing patchwork of overlapping names, and
Flock has removed several of its Wing-related pages from its website, but the product is still sold
and deployed.</p>
<h3>The Pitch</h3>
<p>In October 2020, Flock Safety announced Wing with a press release headline that said, plainly:</p>
<blockquote>
<p><strong>FLOCK SAFETY ANNOUNCES THE WING INTEGRATION TO DISTILL 1000s OF HOURS OF IP CAMERA FOOTAGE INTO
SEARCHABLE IMAGES THAT SOLVE CRIME</strong></p>
</blockquote>
<p>The subhead: “Software transforms existing IP cameras into cameras that can see like a detective”</p>
<p>Wing takes video from existing cameras — IP cameras, security cameras, traffic cameras — and runs
Flock’s AI on it, letting users search for white sedans,
<a href="the-platform">unicycles</a>, or <a href="freeform-freeforall">people wearing jeans</a>.</p>
<p>Cameras connect via standard <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> (Realtime Streaming Protocol), a camera standard that’s supported
by many commercial surveillance cameras as well as consumer products like
<a href="https://amcrest.com/4mp-wifi-camera-doorbell-ad410.html">doorbells</a> and <a href="https://us.store.tapo.com/collections/best-selling-products/products/tapo-c120-indoor-outdoor-wired-security-camera">$35 surveillance
cameras</a>.</p>
<h3>The Wing Ecosystem</h3>
<p>In an August 2025 OMNIA Partners cooperative purchasing pricelist, Wing LPR is listed as: <strong>Flock
Safety Wing™ LPR</strong> (<code>wing_integration</code>, $3,000/yr per camera): “Video software integration
transforms traditional IP cameras into Flock Safety enabled LPR cameras. Includes Vehicle
Fingerprint™ computer vision and Advanced Search Package (Convoy Analysis, Multi Geo Search, Visual
Search)”</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/omnia-flock-pricing-aug-2025.pdf" class="collapsible">OMNIA Partners — Flock Pricing, Aug 2025</a></p>
<p>The same catalog lists the Wing product family: Wing Livestream ($500/yr), Wing Replay ($1,000/yr
with 7-day footage retention), Wing Gateway 2.0 (8–32 stream hardware at $3,650–$8,250 + subscription),
Wing Cloud Live Only ($90/yr), and an Inbound Vehicle Images API ($1,500–$2,500/yr) for ingesting
pre-processed plate reads from third-party LPR systems.</p>
<p>The “Wing Livestream” product price matches the $500 feature that turns Flock’s LPR into live video
surveillance — that’s “something you can take advantage of without going to council,” according to
Flock Safety’s Kevin Cutler.</p>
<div class="grid grid-cols-2 items-center gap-x-2">
  <img src="https://footnote4a.org/blog/speed-cameras/park-lpr.jpeg" alt="Set of Flock LPR cameras facing basketball and pickleball courts">
  <img src="https://footnote4a.org/blog/speed-cameras/wing-live.webp" alt="Live video without approval">
</div>
<p>Flock misleadingly tells the public it sells “LPR” cameras — a product name, not a description —
while it <a href="the-platform">consolidates its network into a single searchable database</a>.</p>
<p>The network from that <a href="https://www.bbc.com/news/articles/cwy8dxz1g7zo">Superbowl Ring commercial</a>,
promising to find your dog is already deployed nationwide on speed cameras, parking enforcement
cameras, and “CCTV” sytems on your basketball and pickleball courts.</p>
<h3>Wing in Practice</h3>
<p>On June 27, 2025, Flock published a blog post titled <em>“Video Without Limitations: Flock Safety’s
Newest Solutions for Law Enforcement”</em> showcasing Wing Gateway 2.0 and Wing Gateway Outdoor.</p>
<p>@v<a href="https://footnote4a.org/blog/speed-cameras/wing-webinar-segment.mp4">Flock Safety — Video Without Limitations Webinar (Wing segment, 13:36–end)</a>
@<a href="https://footnote4a.org/blog/speed-cameras/flock-blog-video-without-limitations.pdf" class="collapsible">Flock Blog — Video Without Limitations</a></p>
<p>In the October 2024 webinar (<a href="https://footnote4a.org/blog/speed-cameras/full-webinar.mp4">full video</a>), Trevor
Pennypacker, Sr. Product Manager at Flock, is excited to tell Flock’s customers that you can connect
“parking lots, restaurants, traffic cameras, really anything.”</p>
<p>The City of Bloomington, IL executed an agreement that explicitly includes Wing LPR in its order
form:</p>
<ul>
<li>“Flock Safety Wing™ LPR — Included — 10 Included”</li>
<li>“Flock Safety Wing™ <abbr class="md-tooltip" data-tooltip="Video Management System">VMS</abbr> — Included — 100 Included”</li>
<li>“Professional Services — Wing Implementation Fee — $500.00”</li>
</ul>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/bloomington-wing-lpr-pages.pdf" class="collapsible">Bloomington IL — Wing LPR Relevant Pages (9 pages)</a></p>
<p>The branding, boundaries, and availability of Wing products is all somewhat shifting and murky —
from Wing Gateway 2.0 to Wing Cloud to Wing LPR — but the core functionality is what matters:
third-party cameras are being turned into Flock nodes, and Flock actively markets and sells that
functionality.</p>
<h2>The Scan-Everything Architecture</h2>
<p>RedSpeed’s cameras are always on during enforcement hours. They capture continuous HD video of every
vehicle passing through the field of view — in a school zone, recording parents, teachers, students,
buses, and anyone else on the road. “Video Technology is required. Still shots are not acceptable.”</p>
<p>The <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> stream — all of it, not just violators — is fed to Flock. The Flock letter confirms this is
by design: the cameras are “turned into ALPRs that push images into Flock Safety’s cloud and allow
agencies with access to those cameras <strong>to search for vehicles.</strong>” Since then, Flock rolled out
FreeForm, its AI-powered search capability that can find people by
physical description: “man in blue shirt and cowboy hat,” “dressed in all black clothing and black
face mask,” or — as one Dunwoody PD officer tried — “GRINCH.”</p>
<h3>Vehicle Fingerprint</h3>
<p>The Vehicle Fingerprint technology alone extracts far more than license plates: plate number and
state registration, vehicle make, model, color, and body type, missing or covered plates, bumper
stickers and decals, roof racks, bike racks, trailer hitches, and aftermarket wheels.</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/flock-vehicle-fingerprint.pdf" class="collapsible">Flock Blog — Vehicle Fingerprint: When Plate Data Fails</a></p>
<p>But that’s only part of the picture. Flock CEO Garrett Langley <a href="https://footnote4a.org/blog/speed-cameras/denver-update.pdf">has previously stated that the
system indexes <em>everything</em></a>, filtering only problematic
<em>searches</em> — or <a href="freeform-freeforall">attempting to filter them</a>, anyway.</p>
<p><img src="https://footnote4a.org/blog/speed-cameras/denver-legal.png" alt="Software recognizes everything" width="500"></p>
<h3>Where that data goes</h3>
<p>No matter how you feel about red-light or speed cameras as a policy matter, it is hard to justify
turning a safety measure for school zones into a surveillance dragnet whose recordings are fed
to a private corporation with no contractual restrictions on use. In San Francisco, SFPD’s Flock
cameras were searched 1.6 million times by out-of-state and federal agencies — in apparent violation
of California law. EFF’s analysis of 12 million Flock searches nationwide found hundreds related to
protest activity, immigration enforcement, and discriminatory targeting. A Norfolk, Virginia resident
sued after learning Flock cameras had logged his location 526 times in four months.</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/sfist-sfpd-flock-federal.pdf" class="collapsible">SFist — SFPD Flock Data Accessed 1.6M Times by Federal Agencies</a>
@<a href="https://footnote4a.org/blog/speed-cameras/aclu-flock-data-sharing.pdf" class="collapsible">ACLU — Flock Can Share Data Even When PDs Opt Out</a></p>
<h2>The Legal Tension</h2>
<h3>Florida’s prohibition on “remote surveillance”</h3>
<p>Florida law explicitly prohibits using school zone speed cameras for “remote surveillance” and
restricts the permitted uses of recorded footage:</p>
<blockquote>
<p>(15)(a) A speed detection system in a school zone may not be used for remote surveillance. The
collection of evidence by a speed detection system to enforce violations of ss. 316.1895 and
316.183, or user-controlled pan or tilt adjustments of speed detection system components, do not
constitute remote surveillance. Recorded video or photographs collected as part of a speed
detection system in a school zone may only be used to document violations of ss. 316.1895 and
316.183 and for purposes of determining criminal or civil liability for incidents captured by the
speed detection system incidental to the permissible use of the speed detection system.</p>
<p>(15)(b) Any recorded video or photograph obtained through the use of a speed detection system
must be destroyed within 90 days after the final disposition of the recorded event.</p>
<p>— Fla. Stat. § 316.1896(15)</p>
</blockquote>
<p>Two questions that nobody appears to have asked, let alone answered:</p>
<p>First, does feeding the full <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> stream to Flock — where it is processed by AI, matched against
vehicle databases, and made searchable by thousands of agencies for purposes wholly unrelated to
speed enforcement — constitute “remote surveillance” under the statute? The statute defines what is
<em>not</em> remote surveillance (evidence collection for speed violations, PTZ adjustments), but the
legislative history does not address third-party AI processing of the video feed.</p>
<p>Second, the statute requires destruction of recorded video within 90 days of final disposition, and
vendors must certify destruction annually. But once the <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> stream enters Flock’s system, it
is processed into Vehicle Fingerprint data, plate reads, and searchable metadata governed by Flock’s
own retention policies — not the county’s.</p>
<p>Altumint, a competing speed camera vendor in Florida, hinted at a loophole when it drew a
distinction explicitly. Its chief revenue officer <a href="https://www.alligator.org/article/2026/03/school-zone-speeding-cameras">told the <em>Independent Florida Alligator</em> in March
2026</a> that Altumint’s
cameras “only capture a license plate if the vehicle is speeding more than 10 miles over the speed
limit,” whereas RedSpeed’s Flock ALPR cameras “can document every license plate that passes by.” He
added: “Even in a school zone, you could be going 25 in a 15 … but I can’t capture that plate. ALPR
can capture that plate.”</p>
<p>Whether derivative data (plate reads, AI-extracted vehicle descriptions) qualifies as “recorded
video or photograph” under the statute is untested. The statute’s drafters were contemplating a
camera vendor that stores and deletes footage. They were not contemplating a speed camera sending
data to a second vendor that ingests the same stream in real time and converts it into a permanent
surveillance record.</p>
<p>No Florida court has addressed either question. No Attorney General opinion appears to exist. The
statute was enacted in 2023 (HB 657). Florida is one of RedSpeed’s biggest markets.</p>
<h2>What Flock Tells Everyone Else</h2>
<p>Across dozens of municipal FAQ pages and Transparency Portals, Flock provides standardized language:</p>
<blockquote>
<p>Flock Safety cameras are <strong>not used to enforce traffic violations</strong> such as speeding, running red
lights, or other moving violations. The cameras <strong>do not capture vehicle speed</strong> and are solely
used for investigative purposes related to public safety.</p>
</blockquote>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/leander-tx-flock-faq.pdf" class="collapsible">Leander TX — Flock FAQ</a>
@<a href="https://footnote4a.org/blog/speed-cameras/columbia-mo-flock-faq.pdf" class="collapsible">Columbia MO — Flock FAQ</a>
@<a href="https://footnote4a.org/blog/speed-cameras/everett-wa-flock-faq.pdf" class="collapsible">Everett WA — Flock FAQ</a></p>
<p>Technically, that appears to be true. “Flock Safety cameras” are not used for traffic enforcement —
RedSpeed’s cameras are. But they operate on Flock technology, within the Flock network.</p>
<p>Flock’s Transparency Portals go further. The Thomasville, GA PD portal explicitly lists “speed
detection” as a prohibited use of Flock technology, and confirms that the system is used “for law
enforcement purposes only.”</p>
<p>Meanwhile, RedSpeed’s speed detection cameras are feeding <abbr class="md-tooltip" data-tooltip="Realtime Streaming Protocol">RTSP</abbr> streams directly into this same
network via Wing LPR. Data from a speed detection system enters a platform that lists speed
detection as a prohibited use.</p>
<p><img src="https://footnote4a.org/blog/speed-cameras/thomasville-transparency-portal.png" alt="Thomasville GA PD — Flock Transparency Portal (screenshot, March 26, 2026)" class="collapsible"></p>
<h3>It’s not <em>our</em> cameras</h3>
<p>The Flock letter on page 5 of the HCSO proposal says Flock provides “an additional layer of
software to the Redspeed cameras (speed and red light).” The transmittal says “Integrated Flock
means RedSpeed’s cameras are feeding the Wing System for enforcement synergy.” The pricing says
“Flock Wing License(s)” are included in a speed enforcement contract.</p>
<p>Flock’s defense rests on a technicality: <em>its</em> cameras don’t capture speed; <em>its</em> technology is
merely consuming the video feed from someone else’s speed cameras and processing it for entirely
different purposes. Whether that distinction will satisfy a legislature, or the parents whose
children are being filmed remains to be seen.</p>
<h3>The Partner Page</h3>
<p>RedSpeed claimed to be the only Flock-integrated vendor for school zone enforcement as of March
2024. As of March 2026, Flock’s partner program page lists several other automated traffic
enforcement companies as “Channel Providers.”</p>
<p>Maybe Flock gave them different territories, outside school zones.</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/flock-partner-ate-providers.pdf" class="collapsible">Flock Partner Program — ATE Channel Providers</a></p>
<h2>The Broader Pattern</h2>
<h3>The GSP Ticket</h3>
<p>On December 26, 2025, Georgia State Patrol ticketed a motorcyclist for holding a cell phone while
riding. The citation read: <strong>“CAPTURED ON FLOCK CAMERA 31 MM 1 HOLDING PHONE IN LEFT HAND.”</strong></p>
<p>GSP called it a “unique circumstance.” The ticket was dropped in court. <a href="https://www.eff.org/deeplinks/2026/03/traffic-violation-license-plate-reader-mission-creep-already-here">EFF described the
incident</a>
as an example of the mission creep it has “long warned about” with surveillance infrastructure.</p>
<p>It is the kind of one-off incident Flock can dismiss. Its long-standing RedSpeed partnership is not.</p>
<h3>Brookhaven, GA</h3>
<p>In <a href="https://web.archive.org/web/20201020111018/https://www.brookhavenga.gov/police/page/brookhaven-uses-technology-reduce-school-zone-speeding">Brookhaven, GA’s
words</a>,
RedSpeed cameras feed “real-time alerts” into “Brookhaven’s existing License Plate Reader (LPR)
platform to identify sex-offenders, protective orders, and wanted persons for increased safety in
school zones.”</p>
<p>Even if you are a concerned parent thinking sounds like a good idea, the practical value of such a
system is questionable at best. Police are not going to act on these “real-time alerts” each time
anyone under a protective order — many of which are not the result of any criminal activity, let
alone any criminal activity involving children — drives through a school zone.</p>
<p>The system’s real-time capabilities, like watchlists and speeding tickets, are secondary. The real
value is in gathering massive amounts of videos and photos of everyone entering a school zone —
parents, teachers, students.</p>
<p>RedSpeed’s strong marketing emphasis on video quality (15 Megapixels, 30 frames per second), raises
questions as well. If a regular Flock LPR, which RedSpeed says is of “lower quality,” is accurate
enough to perform ALPR and create evidence, how is a camera where you can count the pimples on your
middle schooler’s nose an advantage?</p>
<p>The point isn’t better traffic enforcement: it’s high-definition video surveillance.</p>
<p>@<a href="https://footnote4a.org/blog/speed-cameras/brookhaven-redspeed-flock-wayback.pdf" class="collapsible">Brookhaven GA — RedSpeed Flock Integration (Wayback Machine, Oct 2020)</a></p>
<h3>Tampa’s Piggyback</h3>
<p>In Hillsborough County’s seat, Tampa, <a href="https://www.cltampa.com/news/tampa-city-council-could-vote-to-approve-flock-integrated-speed-cameras-in-school-zones/">RedSpeed scored third on an RFP but the council unanimously
voted for the contract
anyway</a>.
Creative Loafing Tampa noted that there was “no indication in the backup materials why the third
place proposal was chosen.”</p>
<p>Before the vote, Creative Loafing reported, “several council members noted they spoke with the Chief
and were assured the data wouldn’t be inappropriately shared.” Council member Lynn Hurtak said “the
only time they are allowed to use this technology is to share it with other agencies when they have
an open case.”</p>
<p>If that’s the policy, it isn’t in the sheriff’s contract.</p>
<h2>Making the Quiet Part Loud</h2>
<p>Flock quietly sells Wing integration in the background while partners like RedSpeed bundle it for
easy consumption by sheriffs and police chiefs. Contracts are kept minimal — no data governance, no
privacy language, no mention of the surveillance layer. The RFP asks for ALPR. The proposal delivers
Flock. The contract says nothing about what Flock does with the data. Nobody on city council asks,
because the pitch is about school safety and the cameras are “violator-funded.”</p>
<p>Across the country, communities have begun pushing back against Flock’s surveillance network.
Austin, Cambridge, Eugene, Evanston, and dozens of other jurisdictions have canceled, paused, or
refused to renew Flock contracts after audits revealed immigration enforcement access,
discriminatory searches, and data sharing that violated state law.</p>
<p>Those fights were about Flock cameras communities <em>knew</em> they were buying. The unified Wing network
is different: residents are now told they’re getting school zone speed cameras, but the video is
being routed into a national surveillance network with no contractual guardrails; or they’re being
told they’re getting license plate readers only to find them watching them shoot hoops.</p>
<p>Flock, RedSpeed, the Sheriff, and elected officials are tired of the push-back. They’re actively
restructuring to keep the public under surveillance and in the dark. We can’t let them.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Who Is Flock Intelligence?]]></title>
            <link>https://footnote4a.org/news/flock-intelligence</link>
            <guid isPermaLink="false">https://footnote4a.org/news/flock-intelligence</guid>
            <pubDate>Tue, 24 Mar 2026 00:10:00 GMT</pubDate>
            <description><![CDATA[An unknown Flock-affiliated entity searched Dunwoody GA PD's camera networks 606 times in five months using AI-powered queries — many targeting political expression. Four other Flock-internal organizations also appear in the logs.]]></description>
            <content:encoded><![CDATA[<p>The <a href="dunwoody-ga-mar2026">Dunwoody GA PD audit data</a> released today contains 606 searches by an
organization called <strong>“Flock Intelligence.”</strong> It is not a police department. It is not a government
agency. Every field that would identify the operator — name, filters, case number — is redacted with
<code>***</code>.</p>
<p>Flock Intelligence does not appear in any audit log before August 2025, and it is absent from the
org audit entirely. It only shows up in the network audit, meaning it searches Dunwoody’s cameras
from outside the department.</p>
<h2>The searches</h2>
<table>
<thead>
<tr>
<th>Month</th>
<th style="text-align:right">Total</th>
<th style="text-align:right">Freeform</th>
<th style="text-align:right">Search</th>
<th style="text-align:right">Convoy</th>
<th style="text-align:right">Other</th>
</tr>
</thead>
<tbody>
<tr>
<td>Aug</td>
<td style="text-align:right">21</td>
<td style="text-align:right">17</td>
<td style="text-align:right">1</td>
<td style="text-align:right">—</td>
<td style="text-align:right">3</td>
</tr>
<tr>
<td>Sep</td>
<td style="text-align:right">225</td>
<td style="text-align:right">164</td>
<td style="text-align:right">34</td>
<td style="text-align:right">22</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Oct</td>
<td style="text-align:right">164</td>
<td style="text-align:right">117</td>
<td style="text-align:right">40</td>
<td style="text-align:right">2</td>
<td style="text-align:right">5</td>
</tr>
<tr>
<td>Nov</td>
<td style="text-align:right">101</td>
<td style="text-align:right">95</td>
<td style="text-align:right">6</td>
<td style="text-align:right">—</td>
<td style="text-align:right">—</td>
</tr>
<tr>
<td>Dec</td>
<td style="text-align:right">95</td>
<td style="text-align:right">93</td>
<td style="text-align:right">2</td>
<td style="text-align:right">—</td>
<td style="text-align:right">—</td>
</tr>
</tbody>
</table>
<p>Over 80% of Flock Intelligence’s queries are FreeForm searches — the AI-powered text prompt feature
<a href="freeform-freeforall">analyzed in detail here</a>. That earlier analysis showed that Flock’s moderation
system warns about political searches but does not block them. Flock Intelligence’s searches confirm
that pattern.</p>
<h2>Political expression</h2>
<p>Among the 170 unique text prompts, a cluster targets vehicles by political expression:</p>
<ul>
<li>“a truck with a trump flag on it” — <code>warn</code></li>
<li>“red honda accord with a trump bumper sticker” — <code>warn</code></li>
<li>“green car with trump bumper sticker” — <code>warn</code></li>
<li>“vehicle with trump bumper sticker” — <code>warn</code></li>
<li>“a SUV with a yellow don’t tread on me flag” — <code>warn</code></li>
<li>“a red nissan rogue with a don’t tread on me flag” — <code>warn</code></li>
<li>“don’t tread on me flag” — <code>warn</code></li>
<li>“american flag” — <code>warn</code></li>
<li>“a car with a british flag” — <code>warn</code></li>
<li>“dallas cowboy flag”</li>
<li>“vehicle with a Dallas Cowboys star sticker”</li>
<li>“vehicle with a Falcons logo”</li>
</ul>
<p>Every political expression search was warned — and every one went through. The sports team searches
passed without even a warning, which tells you where the moderation system draws its lines and how
firmly it enforces them.</p>
<h2>What got blocked</h2>
<p>The moderation system blocked searches describing occupants:</p>
<ul>
<li>“car with two occupants” — <code>block</code></li>
<li>“car with 2 occupants” — <code>block</code></li>
<li>“4 door truck with 4 individuals” — <code>block</code></li>
<li>“four people inside car” — <code>block</code></li>
<li>“green vehicle with a roof rack 4 individuals inside” — <code>block</code></li>
</ul>
<p>And a handful of subjective descriptors:</p>
<ul>
<li>“green car with trashy stickers on it” — <code>block</code></li>
<li>“orange car with person and red shift” — <code>block</code></li>
<li>“crazy looking car” — <code>block</code></li>
</ul>
<p>Other warned searches include “pink breast cancer awareness plate,” “pink ribbon sticker on plate,”
and “german shepard in back of pickup truck.”</p>
<p>So: searching for a specific political candidate’s bumper sticker gets a warning and goes through.
Searching for “crazy looking car” gets blocked. That is the moderation hierarchy Flock built.</p>
<h2>Recurring patterns</h2>
<p>Some searches recur across months in ways that suggest either ongoing tracking:</p>
<p><strong>“Black Mercedes GL450 4MATIC”</strong> appears in October, November, and December. In December it evolves
into “black Mercedes-Benz GLB 250 SUV” and several variations — the same vehicle tracked across a
quarter, description refined over time.</p>
<p><strong>“Armored truck OR Brinks truck”</strong> (and variations) appears every month from August through
December. This is the most consistent search pattern in the dataset.</p>
<p><strong>“White Dodge Charger with black roof and black stripe”</strong> recurs October through December with
slight wording changes.</p>
<p>Again, this is not a police agency. It is a private party performing long-term surveillance on
locations of Mercedes and cash-in-transit vehicles.</p>
<p>Possible reasons range from harmless testing queries (over multiple months — so that seems
unlikely), to employees selling intelligence to criminal actors, to some sort of commercial service.</p>
<h2>Person searches</h2>
<p>Three prompts target people rather than vehicles:</p>
<ul>
<li>“white t-shirt” (objectClass:person)</li>
<li>“person on scooter” / “person with scooter” (objectClass:person)</li>
<li>“yellow backpack” (objectClass:person)</li>
</ul>
<p>All were allowed by moderation.</p>
<h2>Other Flock organizations in Dunwoody’s logs</h2>
<p>Flock Intelligence is not the only Flock-affiliated entity searching Dunwoody’s cameras. Four others
that we’ve seen previously appear here as well:</p>
<table>
<thead>
<tr>
<th>Organization</th>
<th>Months</th>
<th style="text-align:right">Records</th>
</tr>
</thead>
<tbody>
<tr>
<td>Flock City PD - Law Enforcement Demo</td>
<td>Jan–Dec</td>
<td style="text-align:right">~294</td>
</tr>
<tr>
<td>Flock Safety - Admins</td>
<td>Feb–Jun</td>
<td style="text-align:right">~33</td>
</tr>
<tr>
<td>Flock RTCC</td>
<td>Jan, Mar</td>
<td style="text-align:right">~21</td>
</tr>
<tr>
<td>Flock Safety - Engineering</td>
<td>Jun</td>
<td style="text-align:right">~1</td>
</tr>
</tbody>
</table>
<p>“Flock City PD - Law Enforcement Demo” searches Dunwoody’s network every month of the year. That is
a demo environment running against a live police department’s surveillance data — not a sandbox.</p>
<p>“Flock RTCC” — Real-Time Crime Center — searched Dunwoody’s network in January and March.</p>
<p>“Flock Safety - Admins” and “Flock Safety - Engineering” are self-explanatory: Flock employees with
direct access to customer camera networks.</p>
<p>In total, Flock-affiliated entities account for over 1,000 searches of a single police department’s
camera network in 2025.</p>
<h2>What is Flock Intelligence?</h2>
<p>It is not listed as a law enforcement agency. It does not appear on Flock’s public-facing product
pages.</p>
<p>Its operator identities, search filters, and case numbers are all redacted in the logs Flock
provides to its own customers. Dunwoody PD cannot audit who at Flock Intelligence searched their
network, what they were looking for, or why.</p>
<p>As I publish this, at 6:10pm (CDT) on March 23, 2026, Dunwoody PD and Dan Haley — Flock’s chief
legal officer — are telling the City Council that access is only granted to police agencies, and
only for criminal investigative purposes.</p>
<p>Again, police and Flock say one thing, the logs say another.</p>
<p>Someone, somewhere — who is not police — is tracking live data about these vehicles.</p>
<hr>
<p class="text-sm"><em>March 24, 2026 update</em>: Removed claims about Flock Nova pending further verification.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[You Will Own Nothing: How Flock Safety Keeps Cities From Their Own Surveillance Data]]></title>
            <link>https://footnote4a.org/news/own-nothing</link>
            <guid isPermaLink="false">https://footnote4a.org/news/own-nothing</guid>
            <pubDate>Mon, 23 Mar 2026 01:15:00 GMT</pubDate>
            <description><![CDATA[Flock customers technically 'own' their footage — but can't access high-resolution originals, get images with unreliable timestamps and scrubbed metadata, and must submit formal requests through Flock's own evidence platform just to obtain their own records.]]></description>
            <content:encoded><![CDATA[<p>In December 2025, I wrote
<a href="trojan-contracts">an article about Flock changing its Terms and Conditions</a>. That change included
some important language that made “Footage” (a term defined in the contract) no longer “owned” by
Flock customers. Specifically, I wrote:</p>
<blockquote>
<p>Even if the original footage is available to Flock, you may get an edited or altered version (e.g.
cropped or with watermarks overlaid), or a reduced-resolution version. You may also get it late,
or never, and the conditions for access are at Flock’s discretion.</p>
</blockquote>
<p>Although Flock revised its terms again soon after, restoring on-paper “ownership” to the customer
but giving itself broader license to do what it wants with copies, the prediction held. An open
records response from Missouri shows the result of Flock’s policy of “ownership.”</p>
<h2>The Original Footage</h2>
<p>The request was made by <a href="https://deflockjoplin.today/">Deflock Joplin</a>, the group responsible for
the January 2026 headline “<a href="https://www.kctv5.com/2026/01/12/joplin-officer-no-longer-employed-after-alleged-misuse-license-plate-tracking-system/">Joplin officer no longer employed after alleged misuse of license plate
tracking system</a>.” <a href="https://www.muckrock.com/foi/joplin-20300/4th-and-maiden-flock-records-204786/">The records request</a> is straightforward:</p>
<blockquote>
<p>Recordings from the Flock LPR camera located at 4th and Maiden Ln from 2/16/2026 starting at 5:00
PM lasting until 6:00 PM. This camera is on the south west corner of the intersection facing a
southern direction. The records requested should include stills, video, and all other records
generated by the camera. I request the data from Flock OS and the camera’s internal storage.</p>
</blockquote>
<p>The City of Joplin charged $23.57 for the request and fulfilled it a couple of weeks after receiving
payment with a file “Flock_Safety_Search_Image_Results_3-9-2026_1-22-54PM.” The city did not include
40 minutes of footage/images, stating “we are currently experiencing a technical issue affecting
this functionality.”</p>
<p>While technical issues that prevent a city from accessing “its” data would be a cause for concern,
rumor has it that the “technical issues” in question occurred somewhere between the keyboard and the
chair, and the city did not understand how to save images. The city did supply the missing 40
minutes once the discrepancy was pointed out.</p>
<h3>World’s Fastest Truck</h3>
<p>As far as we know, Flock cameras take a series of images and/or a short video clip when they detect
motion. Flock and police often emphasize that it’s “only the license plate” or “just the back of the
vehicle.” Of course, the laws of physics dictate that you can’t know what’s in a picture before you
take it. This truck is a demonstration:</p>
<p><img src="https://footnote4a.org/blog/own-nothing/truck2.jpg" alt="Image #1 of black truck">
<img src="https://footnote4a.org/blog/own-nothing/truck1.jpg" alt="Image #2 of black truck"></p>
<p>These two images were taken in rapid succession. It’s hard to even tell the vehicles are in a
different location, but you can see the “Flock Safety” watermark is positioned
differently.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>These images are clearly of the front of the vehicle. But that’s not the interesting part.</p>
<h3>Metadata and Time Confusion</h3>
<p>Some of these images have been used as evidence at criminal trials, many in the “over 30 cases” that
Flock likes to falsely cite as upholding the constitutionality of its cameras. The timestamps on the
Joplin images should give anyone relying on that evidence pause.</p>
<p>The filename for both images contains “2026-02-16T23-39-42.219+00-00”, suggesting the images were
taken less than 0.0005 seconds apart. That is neither possible, nor true, based on what’s in the
images: we can see the car moving maybe 10 feet. Tacomas don’t typically travel at hypersonic speeds
exceeding Mach 17.</p>
<p>The timestamp in the picture is “2/16/2026 17:39:42 CDT.” This is an odd mix. The date is
unmistakably American (mm/dd/yyyy), but the time is 24 hours rather than am/pm. On February 16,
that’s not confusing. Four days earlier, it might have been.</p>
<p>But even more confusing is that the timezone is labeled as CDT, or Central Daylight Savings Time
(UTC-5). Daylight savings is not in effect in the middle of February in Missouri, when CST (UTC-6)
is in effect. The image is ambiguous as to whether it shows an image taken at 5:39pm or 4:39pm.</p>
<p>The timestamp in the filename (23:39:42.219 UTC) suggests the labeling (“CDT”) is off, but we’ve
already established that it is not possible for the timestamp to be accurate for both images until
we have hypersonic Tacomas.</p>
<p>The (EXIF) metadata has been scrubbed, so there is no third hint.</p>
<p>That leaves these images without a reliable timestamp. These aren’t abstract concerns — they cast
doubt not only on the accuracy of these files, but on the accuracy of every other image produced by
the same system.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<p><img src="https://footnote4a.org/blog/own-nothing/sunset-progression.jpg" alt="Sunset in Joplin"></p>
<p>The only way we can determine the time with any certainty is by looking at the position of the sun
and the 5:59pm sunset noted in the almanac for Joplin, MO, on February 16.</p>
<p>AI-based surveillance so high-tech you need a sundial to make sense of it.</p>
<h3>License Plate Detection</h3>
<p>The other piece of metadata in the image, below the timestamp, is a license plate: <span
class="text-nowrap font-mono">0FH D30</span>. According to <a href="https://www.lookupaplate.com/missouri/0FHD30/">lookupaplate.com</a>, the plate
corresponds to a 2014 Toyota Tacoma with an extended cab.<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup> The plate is also formatted per
Missouri’s light truck standards, with a renewal date in April (<code>F</code>) and a last sale date likely in
2023 or 2024 (<code>H</code>).</p>
<p>The quality of these images is extremely low (<a href="https://footnote4a.org/blog/own-nothing/truck-zoom2.png">second image</a>), to
the point where they no longer contain the license plate information.</p>
<p><img src="https://footnote4a.org/blog/own-nothing/truck-zoom1.png" alt="Zoomed in plate #1"></p>
<p>Everyone who has ever used a computer knows that the “zoom and enhance” from <a href="https://www.youtube.com/watch?v=Vxq9yj2pVWk">movies and TV
shows</a> isn’t really a thing. Sure, you can <a href="https://www.youtube.com/watch?v=u8qgehH3kEQ">backhack</a> and extrapolate <em>some</em> data, but
here too the laws of physics get in the way.</p>
<h3>Access to the Image</h3>
<p>If we assume Flock abides by the laws of physics — if no others — then the only sensible conclusion
is that the license plate encoded in the bottom-right of the frame was not derived from these images
at all, but from some other image that the City of Joplin theoretically owns, but can’t access.</p>
<p>This also independently follows from the fact that the images have watermarks and metadata overlays,
assuming those are not created by the hardware itself.<sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup></p>
<p>The requester was precise and asked for “the data from Flock OS and the camera’s internal storage”
to ensure he got the actual image, and not only a presentation version.</p>
<p>A high-resolution version must exist somewhere. Flock generally suggests that the city owns the
original image and that it will be retained until the end of the retention period. That is to say,
Flock should not be deleting its customers’ data without authorization.</p>
<p>Joplin provided the images shown and states that “[t]he Sunshine Law does not require the Department
to obtain duplicate copies of the same data directly from the vendor or from the camera’s internal
storage in addition to what we can access via our portal.”</p>
<p>In other words, there are no originals, but even if there were, the city can’t access them.</p>
<p>Not even Joplin, the ostensible owner of the images, is allowed to look at them.</p>
<p>Below is an AI-enhanced image, where Google’s “Nano Banana” (a generative AI upscaling model) has
filled in the blanks by making up what could have been in the picture.</p>
<p><img src="https://footnote4a.org/blog/own-nothing/truck-ai.png" alt="AI-enhanced image"></p>
<p>This image does not show the actual content of the original, but it shows a level of clarity and
detail that is much closer to the original image captured than the blurry version that Joplin can
access and provided in response to the request.</p>
<p>The Tacoma is not an outlier; there are cars (<a href="https://footnote4a.org/blog/own-nothing/car1.jpg">picture 1</a>, <a href="https://footnote4a.org/blog/own-nothing/car2.jpg">picture
2</a>), <a href="https://footnote4a.org/blog/own-nothing/suv1.jpg">SUVs</a>, and — just to cover “we don’t
photograph people” — a <a href="https://footnote4a.org/blog/own-nothing/mc.jpg">motorcyclist</a>. None of these plates are legible.</p>
<h2>The Original Logs</h2>
<p>The ownership problem extends beyond images. Logs suffer the same fate. I’ve written at length about
<a href="secret-searches-part2">Flock unilaterally removing log data</a>, and how that cuts against both the
supposed immutability of the logs, as well as customer ownership.</p>
<p>I’ve alluded to how, in some states, it may fall under statutes prohibiting the alteration or
destruction of public records, and written about <a href="flock-vs-foia">how Flock inserts itself in open records
requests</a> even when law prohibits doing so. I won’t rehash all of that here.</p>
<p>Instead, I give you the Flock “Customer Guidance for Preserving and Requesting Flock Data for Public
Records Requests”:</p>
<p>@<a href="https://footnote4a.org/blog/own-nothing/kodex.pdf">Customer Guidance for Preserving and Requesting Flock Data for Public Records Requests</a></p>
<p>It’s a guide on how to submit requests for data via Kodex, which, according to Flock, “is a secure
digital platform for managing, processing, and responding to data and legal requests.”</p>
<p>Flock uses the system for “Legal requests,” which apparently includes open records requests,
“Preservation requests,”<sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup> and “Quick questions.”</p>
<p>Once the ostensible owner of the records requests “their” records from Flock, “Flock’s Evidence
Division and Engineering Team will review your request, pull available data, and transmit the
completed data package through Kodex.”</p>
<p>Flock does note that “our Evidence Policy asks for 14 calendar days to fulfill requests. If data is
needed sooner, we are motivated to help customers to meet any FOIA/PRA deadlines they are facing.”</p>
<p>Government agencies are responsible for their own deadlines. In states with statutory deadlines, and
even those without, the requirement is not “respond within 10 days, or later is fine too if your
vendor is not feeling it.”</p>
<p>In fact, a 14 calendar day limit exceeds the statutory deadline in several states, and entering into
a contract that <em>formally requires</em> non-compliance with law is a legally dubious proposition.</p>
<h2>Ownership in Name Only</h2>
<p>Officials tell the public that Flock’s cameras “take a picture of the back of the vehicle” and “only
capture license plates.” They assure us the image does not include the vehicle’s occupants.</p>
<p>Cities like Joplin genuinely can’t access all of “their” information. They uncritically accept
blurry images with derived license plates, and if they want the originals, they must ask the vendor
nicely and wait at least 14 days — or less, if the Spirit so happens to move Flock.</p>
<p>The ownership is a fiction. The customer has never possessed the original image or the original log.
If it can even obtain it at all, it can’t do so independently; it can only submit a formal request
to Flock — which will respond on its own timeline, in whatever format it chooses.</p>
<p>That’s not ownership. That’s a favor.</p>
<p>And this is the evidence that’s putting people in prison.</p>
<hr>
<p class="text-sm"><a href="https://deflockjoplin.today/posts/2026-03-18-Everyone-Can-Be-Flock.html">Deflock Joplin</a> published
its own analysis of the images, where they raise some excellent points.</p>
<p class="text-sm"><em>Note</em>: The images in this article are post-processed for web delivery. They may be of slightly
lower quality than the originals. The <a href="https://www.muckrock.com/foi/joplin-20300/4th-and-maiden-flock-records-204786/">originals are available via MuckRock</a>.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>This watermark appears in all images, but its placement varies. It suggests maybe Flock is
trying to place it in an area where it would not be in the way. As you can see, it doesn’t
appear to work great. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>See last month’s article about “<a href="burden-of-truth">the burden of truth</a>” for details on how
Flock’s evidence authentication system further exacerbates this problem. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>I make no claims about that website’s accuracy, but we do appear to be looking at a
second-generation Toyota Tacoma. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>This is a reasonable assumption, given what we know about Flock’s hardware. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>Flock having a process for preservation requests is interesting for various (legal) reasons, but
those are outside the scope of this article. <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Lorem Ipsum Is the Most Honest Thing on Flock's Trust Center]]></title>
            <link>https://footnote4a.org/news/trust-center</link>
            <guid isPermaLink="false">https://footnote4a.org/news/trust-center</guid>
            <pubDate>Tue, 17 Mar 2026 02:30:00 GMT</pubDate>
            <description><![CDATA[Flock launched a half-finished Trust Center full of placeholder text and unvetted claims — an unintentional demonstration of the access control failures it was built to deny.]]></description>
            <content:encoded><![CDATA[<p>Flock has been repeatedly criticized — by myself and others — for not adhering to the basic
principles of security, let alone the actual requirements set out by federal regulations and
security frameworks like ISO27k1, and SOC2. There have been multiple incidents where production data
has been used and leaked in development, or vice versa. Flock refuses to acknowledge or learn from
past mistakes. To assuage our fears about control failures, it has now launched the development
version of its new Trust Center to production.</p>
<p>Its newly-launched Trust Center answers such hard-hitting questions as “Is this mass surveillance?”
with:</p>
<blockquote>
<p>Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut
labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris
nisi ut aliquip ex ea commodo consequat.</p>
</blockquote>
<p>Though, to be fair, that answer is better than the complete fabrication elsewhere on its page that
says “Flock does not operate a centralized or open surveillance database. Each customer environment
is independent.”</p>
<p>The meaning of “centralized database” is clearish — Flock likely tries to distinguish it from a
<em>decentralized</em> database. In this case, that claim is similar to claiming your kitchen is not a
centralized place for your pots and pans because you have multiple cupboards.</p>
<p>“Global database” is equally almost-apparent. What the new term “open database” (it also appears on
another page) is supposed to mean is murky. Maybe it will clarify later, or maybe the murkiness is
the point.</p>
<p>In any case, it will be interesting to see what elements survive contact with the legal team. One
page makes claims about academic research partnerships and third-party audits — neither appears to
exist in any meaningful way:</p>
<p><img src="https://footnote4a.org/blog/trust-center/audits.png" alt="Independent audits"></p>
<p>Another page claims that the GDPR is “The world’s strictest standard for data privacy.” Which is not
only incorrect, but shows a complete lack of understanding of what GDPR actually is and how it works
(it is a regulation that sets a floor, not a ceiling — member states can and do impose stricter
requirements).</p>
<p>Anyway …</p>
<p>The fact that a half-finished set of pages found their way to production is embarrassing but not, in
itself, a major issue. I can’t judge that too harshly because I pretty much develop in production
all the time.</p>
<p>Where it becomes an issue is when you’re looking at organization-wide controls and data governance,
as in SOC2 or ISO27k1, which Flock cites in support of its being deserving of trust.</p>
<p>These are essentially wireframed pages. Who deployed them to production? The answer to that question
is almost certainly some web developer or marketing associate working on the page layout and design.</p>
<p>Did Legal or Compliance approve statements like “Lorem ipsum” for public consumption? My magic
8-ball says “absolutely not.” Did the product team review the system description for accuracy? “Try
again.”</p>
<p>The release of these pages is a symptom of Flock’s broader problem: it fails to implement meaningful
controls on access while claiming it has them in its marketing materials. This page is one example.</p>
<p>Another is this screenshot from a video showing a Flock customer service representative with full
access to the admin interface for what appears to be every single Flock customer:</p>
<p><img src="https://footnote4a.org/blog/trust-center/admin.png" alt="Admin access"></p>
<p>According to Flock’s lorem-ipsum-heavy Trust Center, we are looking at independent customer
environments with proper access controls, and definitely not a centralized or open surveillance
database where a low-level Flock employee can click a button to obtain access.</p>
<p>The secondary problem in that screenshot (there are more in the complete video, but more on that
later) is that Flock apparently classified the Olympia Fields IL Park District as “Law Enforcement.”</p>
<p>Presumably that means that it has access to the database that stores information from Flock’s
national network of <a href="network-size">250,000+ cameras</a> (more on that later too).</p>
<p>This is a problem because the Park District does not appear to be a law enforcement agency at all —
it manages playgrounds, picnic shelters, and a disc golf course.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>But once again, nobody appears to have caught the error, despite all the safeguards, constraints,
audits, and controls that Flock touts in its trust centers, old and new.</p>
<p>An agency has access to data it’s not supposed to have, which shows up in a video recorded by
someone who can access data they’re not supposed to have access to. The Trust Center, which was also
published by someone who should not have published it to an environment they should not have access
to, says everything is fine.</p>
<p>Flock can’t be trusted. No amount of lorem ipsuming will change that.</p>
<ul>
<li><a href="https://archive.vn/EX3nl">Data Privacy</a></li>
<li><a href="https://archive.vn/EDyPT">Facts vs Myths</a></li>
<li><a href="https://archive.vn/TQg8j">Civil rights</a></li>
<li><a href="https://archive.vn/MeUY6">Law enforcement</a></li>
</ul>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Park Districts in Illinois are independent municipal corporations that <em>can</em> employ police
officers, but only a handful do so — Olympia Fields Park District does not appear to be one of
those few. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock Releases Marketing Video, Leaks CJI and Own Address]]></title>
            <link>https://footnote4a.org/news/drone-as-dataleak</link>
            <guid isPermaLink="false">https://footnote4a.org/news/drone-as-dataleak</guid>
            <pubDate>Fri, 06 Mar 2026 03:00:00 GMT</pubDate>
            <description><![CDATA[Flock's two-minute cinematic masterpiece appears to show real license plates with real hotlist entries broadcast on screen — and the address of an unidentified industrial building surrounded by Flock hardware.]]></description>
            <content:encoded><![CDATA[<p>Flock posted <a href="https://youtu.be/VZnFcbxnd4A">a new marketing video</a>. It shows real license plates
associated with real criminal justice information, broadcast on screen, unredacted. Whether anyone
on the marketing team <a href="https://haveibeenflocked.com/news/flock-access">is even on the CJIS certification
list</a> is left as an exercise for the reader.</p>
<p>The events in the video take place at <a href="https://www.loopnet.com/Listing/1310-Seaboard-Ind-Blvd-NW-Atlanta-GA/37472643/">Flock’s offices</a> in an anonymous industrial building
at 1310 Seaboard Industrial Blvd NW, Atlanta, GA — Google Maps confirms the building is surrounded
by Flock equipment and is identified as a drone launch site.</p>
<p>Now, the film.</p>
<p>Flock’s story starts when a hoodie-clad man rolls up to the crime scene in his brand-new Mazda.</p>
<p>He gets out and approaches the building’s front door, tactical Halligan bar in hand.</p>
<p>Unfortunately for the would-be ne’er-do-well, a blue light comes on.</p>
<p>On the screen it says “From detection to decision.”</p>
<p>The camera pans from the blue light to a Flock Falcon license plate reader, which definitely only
captures license plates and not people.</p>
<p>It’s a little unclear if the “detection” is the blue light, and the “decision” is the license plate
reader, or if there’s something else going on.</p>
<p>Never mind. A Realtime Crime Center!</p>
<p><img src="https://footnote4a.org/blog/drones-as-dataleak/rtcc1.png" alt="RTCC Phoenix plates" class="w-2/3"></p>
<p>The interface shows 3 license plates with real Phoenix, AZ, locations. They are flagged as “Expired
Driver’s License”, “Suspended”, and “Invalid License” — exactly the category of high-level crime
that Flock believes warrants placing a nation under surveillance.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>A man with a moustache clicks “Dispatch drone.”</p>
<p>This time, the ALPR list shows license plates annotated “Invalid License”, “Sex Offender”,
“Expired Tag”, and “Expired Driver’s License.” Those CJI tidbits slide off the screen and cut to a
drone being released from a box.</p>
<p>If it was your license plate broadcast alongside “Sex offender”: congratulations, you get to talk
to a lawyer.</p>
<p>“Drone as Automated Security deployed”, the on-screen letters inform us.</p>
<p>The drone takes off and spots the Mazda parked under a streetlamp about twenty feet away.</p>
<p><em>Technologia</em>.</p>
<p>The Mazda appears to be parked more than 12 inches from the curb.</p>
<p><em>Dramatic music intensifies</em>.</p>
<p>“Thermal night vision capabilities.”</p>
<p>The Mazda is still parked under the streetlamp.</p>
<p>Now we see a digitally altered black-and-white image. Thermal vision, presumably — though it
reads as a color-filter pass on regular footage.</p>
<p>Halligan-bar-man is doing something with the door. The drone switches back to normal vision,
because the other vision was garbage.</p>
<p>Our hero, the drone, sneaks up on Halligan-man as the letters assure us of “Presence that
de-escalates.”</p>
<p>Halligan-bar-man flips out.</p>
<p>He runs away, toward his Mazda.</p>
<p>Someone somewhere gets a phone notification: “Global Logistics has invited you to spectate a flight
on Flock DFR.”</p>
<p><em>Grab the popcorn, we’re spectating</em>.</p>
<p>The drone watches our man peel off past several Flock ALPRs and PTZs.</p>
<p>Now we’re back at dispatch in Phoenix, walkie-talkie’ing Dunwoody PD, which recently paused its
Flock contract “<a href="https://atlpresscollective.com/2026/02/25/dunwoody-flock-contract-911/">over data use concerns</a>.”</p>
<p>Officer Dunwoody manages his drone from the car laptop en route to the crime scene. Operating
aircraft you can’t see while you’re driving a vehicle is safe, right? Must be — the FAA allows it.</p>
<p>Meanwhile, for reasons only known to hoodie-man, he has circled back and parked at Flock Central —
1310 Seaboard Industrial Blvd NW — the drone’s home base. He is ready to surrender his life of crime
and be arrested for the one offense he committed: parking too far from the curb.</p>
<p><em>Music crescendos</em>.</p>
<p>He gets out of his new Mazda, wireless CarPlay still connected, hands to the sky.</p>
<p><em>Handcuffs</em>.</p>
<p>We got him, boys.</p>
<p>“Flock Drone as Automated Security”</p>
<p>“One click automated operation”</p>
<p>Dead stick logo.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>The RTCC screen implies stops predicated on a plate associated with a suspended license. A
vehicle registration tied to a suspended license is not probable cause to stop the vehicle — the
registered owner may not be driving, and status attached to a person does not transfer to the
car. <em>Kansas v. Glover</em>, 589 U.S. 376 (2020) created a narrow reasonable suspicion exception
where an officer <em>reasonably infers</em> the owner is driving, but that inference is rebuttable and
fact-specific — not a blanket authorization to stop every plate that returns a suspended
license. Why we’re putting them up on a screen is anyone’s guess. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Iowa's ALPR Bill Would Make Des Moines the License Plate Data Capital of America]]></title>
            <link>https://footnote4a.org/news/hf2161-march</link>
            <guid isPermaLink="false">https://footnote4a.org/news/hf2161-march</guid>
            <pubDate>Tue, 03 Mar 2026 22:15:00 GMT</pubDate>
            <description><![CDATA[An amendment strips warrant requirements and hands insurance companies access to a national surveillance database — with Iowa as the legal gateway.]]></description>
            <content:encoded><![CDATA[<p><a href="https://www.legis.iowa.gov/docs/publications/LGI/91/HF2161.pdf">Iowa House File 2161</a> started life as a bill purporting to regulate Automatic License Plate
Readers (ALPRs). It began as a well-intentioned, if likely toothless, attempt to put guardrails
around police use of surveillance technology. <a href="https://www.legis.iowa.gov/docs/publications/AMDI/91/H8006.pdf">An amendment</a> has turned it into something
else: statutory authorization for commercial entities to access a privately-operated surveillance
network built on public property, public permits, and public contracts — all under the guise of
fraud prevention<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> and claims adjudication.</p>
<p>Civil rights organizations appear not to have caught on. At the time of writing, they are still
voicing support for a bill that threatens to severely undermine the privacy rights of everyone in
the country.</p>
<h2>A Private Network on Public Infrastructure</h2>
<p>The legal theory under which camera-operators and police operate is that they are photographing
vehicles on public roadways, and that the images therefore don’t implicate privacy interests.</p>
<p>Flock’s cameras sit on public utility poles, installed under public permits, paid for under public
contracts — infrastructure a purely private company could never obtain on its own. The data flows
into a corporate-owned database that participating agencies can query nationwide. Flock is not a
government agency; it’s a vendor that has successfully made itself look like public infrastructure.</p>
<p>The data is public enough to collect from every street corner without a warrant; when requested
under open records laws, those same images and records tend to magically transform into sensitive
intelligence not fit for public consumption.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> When a Washington state court found that
version of Schrödinger’s photographs — public enough to gather on every corner, too sensitive to
disclose to the public whose streets paid for them — to be legally incoherent, police across the
state cancelled their ALPR contracts, ostensibly to protect Washingtonian privacy.</p>
<p>Vendors and police have so far resisted both horns of this dilemma. There is no warrant requirement
for collection, no meaningful FOIA access, and agencies can look up anyone’s long-term, nationwide
location history without judicial oversight. The data is pooled nationally. A camera in Des Moines
contributes plate reads to the same database as a camera in Houston.</p>
<p>This is not an Iowa database. It is a national one.</p>
<h2>How Iowa Becomes a National Gateway</h2>
<p>Readers outside the Hawkeye State may not be aware that Des Moines is a — perhaps <em>the</em> — major
<a href="https://data.iowa.gov/Regulation/Iowa-Domiciled-Insurance-Companies/wd57-wrqf/explore/query/SELECT%0A%20%20%60company_name%60%2C%0A%20%20%60company_type%60%2C%0A%20%20%60naic_number%60%2C%0A%20%20%60iowa_license_number%60%2C%0A%20%20%60iowa_domiciled%60%2C%0A%20%20%60address1%60%2C%0A%20%20%60address2%60%2C%0A%20%20%60company_city%60%2C%0A%20%20%60company_state%60%2C%0A%20%20%60company_zip%60%2C%0A%20%20%60telephone%60%2C%0A%20%20%60alternate_address1%60%2C%0A%20%20%60alternate_city%60%2C%0A%20%20%60alternate_state%60%2C%0A%20%20%60alternate_zip%60%2C%0A%20%20%60alternate_telephone%60%2C%0A%20%20%60business_license_type%60%2C%0A%20%20%60ownership_type%60%2C%0A%20%20%60location%60%2C%0A%20%20%60alternate_location%60/page/filter">insurance hub</a> in the United States, home to Principal Life, Transamerica, Wellmark,
EMC, United Fire, and dozens of others. Iowa-domiciled insurers account for roughly 2–4% of total US
premiums, heavily concentrated in life, annuity, and commercial lines.</p>
<p>The amendment doesn’t restrict ALPR data access to Iowa insurers, Iowa plates, or Iowa accidents. It
opens the tap to any “insurance carrier, or an insurance support organization” — nationally, without
geographic limitation.</p>
<p>Flock and similar vendors maintain a pooled database of plate reads contributed by agencies across
the country. An Iowa city enters into an agreement with Flock. Under the amended bill, that city may
now lawfully share the data — location history, timestamps, images — with insurers for “adjudicating
insurance claims,” even if the data was originally collected nowhere near Iowa. Iowa’s authorization
is the fig leaf that legitimizes access to a database populated by agencies in California, Texas,
and New York.</p>
<p>That’s data laundering: a permissive jurisdiction provides the legal cover that turns a
publicly-subsidized national surveillance network into a commercial data product. Iowa’s
overrepresentation in the insurance industry means the companies most likely to exploit this are
disproportionately headquartered in the same state that just handed them the keys.</p>
<p>The phrase “insurance support organization” makes this worse. In insurance law, that covers data
aggregators, claims analytics firms, and infrastructure providers like <a href="https://www.verisk.com/solutions/underwriting-rating/general-liability/">Verisk/ISO</a> —
entities whose business is pooling and reselling data across the industry. Data that enters that
pipeline does not stay in the lane it entered through.</p>
<p>The amendment doesn’t just give insurers access to ALPR data; it gives the entire insurance data
ecosystem access to ALPR data.</p>
<p>Next time you’re involved in a car accident, the insurer may pour through your location history to
find reasons not to pay. Stopped at a bar the night before, even for a diet soda? That may become an
argument. If your employer’s insurer is watching while you recover from an injury, think twice
before leaving the house to pick up your prescription.</p>
<h2>What the Amendment Actually Removed</h2>
<p>The original bill named a legal threshold: no one could access ALPR data more than 24 hours after
capture without a magistrate-issued search warrant or a county attorney’s subpoena for a specific
plate. In practice, the subpoena option gutted the warrant requirement before the ink dried — a
county attorney can issue one without judicial oversight, meaning the same prosecutorial office that
wants the data could authorize its own access. But even that weak threshold is gone.</p>
<p>In its place: a requirement to log a “call for service number or case number” before searching.
That’s an administrative record-keeping requirement, not a legal threshold. No independent review,
no probable cause, no judicial oversight.</p>
<p>The original bill also flatly prohibited sharing data with any nongovernmental third party. The
amendment replaced that prohibition with an explicit whitelist that includes insurers, or anyone who
promises to use the data “for the sole purpose of protecting public safety, conducting criminal
investigations, or ensuring compliance with federal, state, or local law.” What was a ban became an
authorization.</p>
<p>The penalty regime was similarly softened. Violations now require proof of “willful and intentional”
conduct, and the aggravated misdemeanor threshold requires the violation also be committed “for
personal gain or while violating any other provision of law.” Routine unauthorized sharing — the
kind driven by bureaucratic carelessness or vendor pressure — is unlikely to be prosecuted at all.</p>
<h2>The Lobbying Picture</h2>
<p>The <a href="https://www.legis.iowa.gov/lobbyist/reports/declarations?ga=91&amp;ba=HF2161">lobbying declarations</a> for this bill tell a more complicated story than the civil
liberties coalition supporting it would suggest.</p>
<p>The Iowa Association for Justice, Institute for Justice, the American Civil Liberties Union of Iowa
(ACLU-IA), and Americans For Prosperity are all registered For the bill. AFP’s registration predates
the amendment by two weeks; ACLU-IA’s and IJ’s were filed the same day the amendment dropped in
committee. Whether their support reflects the amended text or the original is a question worth
asking them directly.</p>
<p>Flock itself is registered as Undecided. So is RELX Inc. — the parent company of LexisNexis Risk
Solutions, one of the largest data brokers in the country. LexisNexis Risk Solutions sells
comprehensive consumer risk profiles to insurers, compiled from court records, motor vehicle
databases, property records, and commercial data sources. It has no reason to be watching this
legislation unless the amendment’s “insurance support organization” carve-out is relevant to its
business — which it plainly is. That it hasn’t registered in support suggests either that the bill
doesn’t go far enough, or that it’s waiting to see which way it moves. The National Insurance Crime
Bureau — explicitly named in the amendment’s carve-out — is also Undecided.</p>
<p>The Iowa State Sheriffs’ &amp; Deputies’ Association, the Iowa State Police Association, and the Iowa
Peace Officers Association are all registered Against. So are Axon Enterprise and the Security
Industry Association — Flock’s commercial competitors, whose objections are about market share, not
civil liberties.</p>
<p>No group is opposing the bill on civil liberties grounds.</p>
<h2>What This Bill Actually Does</h2>
<p>It authorizes local Iowa governments to deploy a privately-operated surveillance network on public
infrastructure — then share the resulting data with the commercial insurance industry, nationally,
with no warrant requirement, no meaningful penalty for abuse, and no restriction on which insurers,
in which states, beyond the three enumerated purposes.</p>
<p>Iowa is not regulating mass surveillance. Iowa is commercializing it.</p>
<hr>
<p class="text-xs text-muted mt-4 mx-4 text-center">Cross-posted from <a href="https://footnote4a.substack.com/p/how-the-iowa-alpr-bill-enables-mass">Footnote 4A</a>, where I cover Flock, privacy, and public-private
surveillance infrastructure more broadly. Flock-specific posts live on
<a href="http://haveibeenflocked.com">haveibeenflocked.com</a>.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Iowa DOT’s long-running <a href="https://footnote4a.substack.com/p/dot-frt">facial recognition program</a> also began life as a tool to combat
fraud. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Despite the database being owned and operated by a private corporation — one whose cameras were
installed using public permits, public contracts, and in many cases public funds. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock promises to implement logging feature it claimed existed]]></title>
            <link>https://footnote4a.org/news/california-cjis</link>
            <guid isPermaLink="false">https://footnote4a.org/news/california-cjis</guid>
            <pubDate>Mon, 02 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Flock Safety's blog post about 'enhanced guardrails' is a confession dressed as a product announcement. The company admits it wasn't logging sharing configuration changes — a CJIS Security Policy violation — while its guardrails still leave tribal nations and private universities outside SB 34's reach.]]></description>
            <content:encoded><![CDATA[<p>In November last year, I published “<a href="federal-insecurity">Federal Insecurity: How Flock Lies to the Feds</a>.”
Now, Flock got caught in that lie. But it promises to do better. Sort of.</p>
<p>Several California agencies have reported discovering that data was shared in violation of SB
34—although I have not yet been able to verify the exact number, I’ve heard as many as 63 California
agencies have been confirmed affected. This certainly seems plausible with separate reports coming
out of <a href="https://www.ktvu.com/news/flock-cameras-saratoga-mountain-view-immigration">Mountain View</a>, <a href="https://santacruzlocal.org/2026/01/13/santa-cruz-leaders-vote-to-terminate-contract-with-flock/">Santa Cruz</a>, <a href="https://abc7news.com/post/santa-clara-county-stop-using-flock-safety-cameras-several-cities-privacy-concerns/18646060/">Santa Clara County</a>, and <a href="https://www.cbsnews.com/losangeles/news/flock-license-plate-readers-shared-data-with-out-of-state-federal-agencies/">Ventura County</a>.</p>
<p>In <a href="https://losgatan.com/santa-cruz-terminates-its-contract-with-flock-safety/">earlier reporting by Los Gatan</a>, Santa Cruz said that Flock had notified them of an issue.
In response to a CPRA request, Santa Cruz denies the existence of that email.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> However, Santa
Cruz Chief of Police Bernie Escalante <em>did</em> deliver the following statement at a November 18, 2025,
Santa Cruz city council meeting:</p>
<blockquote>
<p>We were recently made aware that Flock Safety identified violations of SB 34 and SB 54 within
their system architecture that inadvertently affected agencies across California, including the
City of Santa Cruz.</p>
<p>The issue arose when a national search tool within the Flock Safety system was activated which
inadvertently permitted law enforcement agencies outside the state of California to search all
agencies across the country including agencies within the state of California.</p>
<p>These violations were not known to Santa Cruz Police Department and were not the result of any
deliberate attempt by city staff to circumvent the California law.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> We have been notified by
Flock that these violations ceased on February 11, 2025.</p>
<p>Additionally, since this date, Flock has added multiple layers and filters of security to ensure
this does not occur again in the future. Since February 11, 2025, Flock has made several changes
to their system to ensure this does not occur again and to ensure that the Santa Cruz police
department is not in violation of state law—both SB 34 and SB 54.</p>
<p>So far, Flock has deactivated the national search tool for agencies within the state of
California, revoked all permissions for any California agency to create a 1:1 relationship with
any agency outside the State of California and added filter protections against any searches that
include anything related to ICE, broder patrol, immigration, or any other word or phrase like this
type of search.</p>
<p>Flock continues to look for additional ways to improve or modify their system to ensure the
security of their data is within the laws of the state of California.</p>
<p>— <a href="https://www.youtube.com/watch?v=ia-Qm-huAJM">SCPD Statement</a>, Santa Cruz City Council Meeting, November 18, 2025</p>
</blockquote>
<p>A lot of this statement is demonstrably false.</p>
<p>As we know, <a href="el-cajon-ca-feb2026">1:1 sharing is alive and well in California</a>.</p>
<p>Yet this is the statement SCPD made in November last year, about an action Flock had taken some time
before February 2025—a little over a year before today’s blog post, where it announces, for the most
part, the same problem and the same changes.</p>
<p>Either Flock kept all of this under wraps for over a year,<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup> or it happened again, because Flock is
once again engaging <a href="https://archive.is/aD5ly">damage control mode on its blog</a>, announcing many of the same “new”
features the SCPD announced were introduced in February 2025.</p>
<p>Of course, it’s Flock, so “damage control” means “hand me a shovel so I can keep digging.”</p>
<h2>Flock Knows, You Don’t.</h2>
<blockquote>
<p>some CA law enforcement agencies, including Ventura County, in 2025 had their camera networks
inadvertently accessible<sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup> to out-of-state law enforcement agencies for a period of time.</p>
</blockquote>
<p>Flock immediately downplays and obfuscates what happened. Agencies “had their cameras accessible.”
That doesn’t mean anything. “For a period of time.” Equally meaningless. How much data was shared in
violation of state law? For how long?</p>
<p>Flock knows what happened, and, according to SCPD, even notified agencies back in 2025, but it has
decided you don’t get to know.</p>
<blockquote>
<p>[Flock] made every effort possible to determine the cause of each reported instance of inadvertent
sharing. Unfortunately, due to earlier limitations in technical logging, in some cases it is
impossible to determine a specific cause.</p>
</blockquote>
<p>Let’s assume for a second that this is true. Let’s say Flock is careless and does not log who makes
changes to a critical toggle.</p>
<p>If a cause can’t be determined, it can only mean one thing: there are multiple options.</p>
<p>It means Flock customers are <strong>not</strong> the only ones in control. It means that the pitch that “you own
100% of your data, and you are in control”, as well as “it’s a local decision” is completely,
utterly, false. There is no other explanation.</p>
<p>Flock, in this same blog post, nonetheless continues to assert that “cities and counties retain
100% control over their LPR data and determine who it is shared with.”</p>
<p>Clearly not.</p>
<h2>The Logging Requirement</h2>
<p>Flock not having logging would in itself be yet another admission that it does not follow the CJIS
security policy, like it implies when it flaunts its “CJIS ACE Certificate” from its commercial
partner in Florida.</p>
<p>The <a href="https://le.fbi.gov/file-repository/cjis_security_policy_v6-0_20241227.pdf">CJIS Security Policy v6.0</a> has several relevant requirements:</p>
<ul>
<li>AU-2 (Event Logging) and CM-3 (Configuration Management) require exactly the type of logging Flock
claims not to have.</li>
<li>4.2.5.1 (Justification) and AU-3 (Content of Audit Records) require the purpose of a query. Flock’s
<a href="https://footnote4a.org/dropdown-reasons">NIBRS-based</a> justification requirement is not an enhancement — it is the minimum
that should have been in place from the outset.</li>
<li>CA-3(d) (Secondary Dissemination) — secondary dissemination must be logged; those logs must
include the requester’s authorization.</li>
</ul>
<p>In Flock’s half-baked defense, it does fall on the agencies to verify that Flock abides by the terms
of the contract it signed, and to make sure their vendor isn’t simply having its rank-and-file
employees sign <a href="flock-access">a form that exposes them, not the company</a> to liability when
violations inevitably happen.</p>
<h2>Flock Promises More Violations</h2>
<p>For those who have been following along for a while, the gradual narrowing is interesting to watch.
In a span of weeks, Flock’s messaging shifted from “Flock does not sell data,” to “Flock does not
sell data to the federal government” to “Flock does not sell data to DHS agencies.”</p>
<p>When even the <a href="https://footnote4a.org/pd/8258-federal-us-postal-inspection-service/audit?q=immigration&amp;sort=date_desc">postal service does civil immigration enforcement</a> it becomes hard to track.</p>
<blockquote>
<p>“Flock has always provided agencies with tools to comply with state law and relied on each agency
and its legal counsel to determine how those tools should be configured,” said Dan Haley, Chief
Legal Officer at Flock Safety.</p>
</blockquote>
<p>Dan clearly did not read the 345 words in the blog post preceding that statement, announcing that
Flock, in fact, did not always provide those tools but is now adding them.</p>
<blockquote>
<p>Flock Safety and California law enforcement agencies remain committed to ensuring that
investigative technologies are used responsibly, lawfully, and with appropriate oversight. The
system in place today includes standardized compliance protections designed to prevent
unauthorized federal access through lookup networks and to provide clear audit trails for every
search conducted.</p>
</blockquote>
<p>This statement deserves highlighting. Flock once again promises to prevent only unauthorized
<em>federal</em> access, and only if that unauthorized access happens <em>through lookup networks</em>.</p>
<p>This is a highly relevant distinction; at the time of writing, even a cursory inspection of
Transparency Portals shows Flock still permits sharing data with non-California agencies. And, no,
I’m not talking about <a href="el-cajon-ca-feb2026">El Cajon</a>’s open defiance of the AG, I’m talking about
Lake County, Piedmont, San Francisco, and so on.</p>
<p>California Attorney General Bonta clarified in his <a href="https://oag.ca.gov/system/files/media/2023-dle-06.pdf">October 2023 bulletin</a> that SB34 prohibits
sharing with any entity that is not a public agency. He included the definition:</p>
<blockquote>
<p>“Public agency” is defined as “the state, any city, county, or city and county, or any agency or
political subdivision of the state or a city, county, or city and county, including, but not
limited to, a law enforcement agency.”</p>
</blockquote>
<p>Because this definition excludes non-California agencies, it forms the basis for SB 34 being
understood to prohibit sharing outside of California.</p>
<p>What this definition also does not include are tribal nations and private university police —
neither are subdivisions of the State of California. Yet both appear on Flock’s California agency
lists: Blue Lake Rancheria Tribal PD, the Iipay Nation of Santa Ysabel, Stanford University PD, and
the University of the Pacific. All are permitted to access California ALPR data under Flock’s
“guardrails.”</p>
<p>These agencies also fit neatly into Flock’s promise, because arguably, although they have access to
the lookup network, they could be said not to be “federal agencies.” Of course, they also aren’t
“public agencies,” and all of this still violates the law.</p>
<p>Flock’s guardrails are carefully designed — not to prevent unlawful sharing, but to redefine what
counts as sharing. Each iteration narrows the promise while leaving the violation intact: not “we
don’t share data,” but “we don’t share data with DHS agencies through lookup networks in ways we
can’t characterize as something else.”</p>
<p>The question for California agencies isn’t whether Flock “remains committed” to lawful use. It’s how
many times they’re willing to take that commitment at face value before they check the audit logs —
assuming, of course, that Flock has started writing them.</p>
<p>(Perhaps this is why Flock is now <a href="https://www.classlawgroup.com/flock-safety-license-plate-reader-cameras-lawsuit">facing a class action in California</a>.)</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Of course, in keeping with the government’s long-standing tradition of disdain for
transparency, Santa Cruz sent its CPRA response at 5:02 <span style="font-variant:
all-small-caps">PM</span>. I will update this article with an explanation of the contradiction,
should the city provide one. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Remember kids, it’s okay to break the law, as long you don’t do it on purpose. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>Which says nothing good about the California agencies that didn’t notice this in their
logs for a year—as I pointed out last <a href="august-2025-drop">November</a>. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>It could be a coincidence both Flock and SCPD both use the phrase “inadvertently
accessible.” It could also not be. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock's Best Argument: Cops Can't Stop Being Racist Without Us]]></title>
            <link>https://footnote4a.org/news/racist-cops</link>
            <guid isPermaLink="false">https://footnote4a.org/news/racist-cops</guid>
            <pubDate>Fri, 27 Feb 2026 21:00:00 GMT</pubDate>
            <description><![CDATA[A surveillance company and a surveillance-industry lobbyist walk onto a livestream.]]></description>
            <content:encoded><![CDATA[<p>This is a verbatim quote from <a href="https://archive.is/eeP96">Flock’s latest blog post</a>:</p>
<blockquote>
<p>For decades, policing often relied heavily on eyewitness descriptions.</p>
<p>An officer might hear:</p>
<p>“We’re looking for a white Ford.”</p>
<p>“The suspect was driving a blue Jeep.”</p>
<p>What happened next?</p>
<p>Officers would stop every vehicle matching that general description in the area. That meant
multiple drivers, often entirely innocent, were pulled over and had unwelcome interactions with
law enforcement simply because their car looked similar. Those stops could lead to frustration,
fear, and unnecessary escalation. And historically, those broad stop practices have
disproportionately affected communities of color.</p>
<p>This is exactly the kind of dynamic that creates distrust.</p>
<p>Flock changes that.</p>
<p>Instead of stopping every white Ford or blue Jeep in a radius, officers receive alerts only when a
specific license plate associated with a reported crime is detected. Not every vehicle of a
certain color. Not every driver in a neighborhood. Just the one vehicle that matches the reported
plate. That’s precision policing. It reduces unnecessary stops. It reduces guesswork. It reduces
broad, discretionary sweeps. And that reduction in discretion helps reduce bias.</p>
</blockquote>
<p>The passage directly echoes a comment made last week by Skylor Hearn on a privacy-focused
livestream hosted by VPN company <a href="http://vp.net">vp.net</a>. Hearn appeared alongside Dan Haley, Flock’s Chief Legal
Officer. Hearn told the audience:</p>
<blockquote>
<p>In the old days… it was the citizen, one of you, reporting what you saw in a flash, in a
horrific moment in your life, and you described generally a light-colored car. And so we’re
stopping every light-colored car that’s going down the road in that area. And 99% of those people
in those cars had nothing to do with that crime, but we’re pulling you over sometimes at gunpoint,
taking you out… The technology gives us the ability to be more select and discretionary in those
same kind of encounters. So we’re not indiscriminately just stopping everyone that resembled the
citizen’s call. This gives us another tool to help us be more sniper than shotgun.</p>
</blockquote>
<p>Same argument, same structure, same anecdote. Cops used to pull over every white car at gunpoint;
now Flock saves them from themselves.</p>
<p>Hearn was introduced on the stream as “Chief Deputy, Chambers County Sheriff’s Office.” That’s true
— he holds that title.</p>
<p>What the hosts neglected to mention is that Hearn is also the Executive Director of the <a href="https://www.sheriffstx.com/">Sheriffs’
Association of Texas</a>, a <a href="https://pulitzercenter.org/stories/texas-ai-powered-surveillance-arsenal-has-ballooned-proposed-laws-provide-few-guardrails">registered lobbyist for Clearview AI</a> in 2020–2021, and a
former <a href="https://www.klgates.com/kl-gates-adds-longtime-public-safety-professional-as-austin-government-affairs-advisor-6-15-2020">government affairs adviser at K&amp;L Gates</a>, where Clearview AI was his client.</p>
<p>He joined Clearview in-house in 2022 as its Director of Government Affairs, spending his time
testifying in state legislatures against banning or restricting police use of facial recognition
technology.</p>
<p><img src="https://footnote4a.org/blog/racist-cops/hearn.png" alt="Hearn on the vp.net livestream, February 21, 2026"></p>
<div class="text-sm text-center mb-2 italic">
Lobbyist Hearn on the vp.net livestream, February 21, 2026. Or Texas cop "I Spy".
</div>
<p>When a viewer asked Hearn directly about his Clearview AI and K&amp;L Gates history, he disclosed it —
framing it all as “public policy work” and talking about “misconceptions about technology.” He did
not use the word “lobbyist.”</p>
<p>So a man who is simultaneously a Flock subscriber and the Sheriffs’ Association’s legislative
director sat down with Flock’s Chief Legal Officer on a livestream, and a week later their shared
talking point appeared on Flock’s corporate blog.</p>
<p>The best argument this team could muster asks us to accept the premise they’re selling: that police
officers are simply incapable of conducting constitutional traffic stops without an AI to chaperone
them.</p>
<p>Their proposed solution to police violating one group’s rights? Let Flock violate everyone’s.</p>
<p>The Fourth Amendment does not have a carve-out for good intentions, and mass surveillance is not a
civil rights program.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Eighteen Years of Nightly Lineups]]></title>
            <link>https://footnote4a.org/news/dot-frt</link>
            <guid isPermaLink="false">https://footnote4a.org/news/dot-frt</guid>
            <pubDate>Mon, 23 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Iowa's DOT has run nightly facial recognition scans on millions of driver's license photos for eighteen years. In the past four, the scans have led to 14 criminal charges and zero recorded convictions.]]></description>
            <content:encoded><![CDATA[<p>Every night for the past eighteen years, the Iowa Department of Transportation has
scanned the face of every new driver’s license applicant against its entire photo
database. When its algorithm decides two faces look alike, an investigator pulls
credit histories, utility bills, social media posts, and criminal records into a
file. No warrant. No probable cause. No indication of fraud. Just a machine’s
say-so.</p>
<p>In response to an open records request, the DOT initially said it didn’t know
how many of these investigations led to convictions — or even to license
denials. It could confirm only that between January 2022 and November 2025,
there were 192 such cases.</p>
<p>The DOT promised to compile outcome data by early January and delivered—albeit a
bit late. The <a href="https://footnote4a.org/blog/dot-frt/dot-frt.xlsx">spreadsheet</a> tells a remarkable
story: of the 192 investigations, 28 led to no action of any kind, and only 14
resulted in criminal charges. The spreadsheet does not record whether any of
those charges led to convictions.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>This has been happening since at least 2008. And, of course, the FBI has been
tapping into Iowa’s database since <a href="https://footnote4a.org/blog/dot-frt/MOU-2014.pdf">at least 2014</a>.</p>
<p>Iowa is not unique, but its story illustrates, in granular detail, how the
federal government and state DMVs have quietly built one of the largest
surveillance infrastructures in American history — and how the agencies
operating it have no idea whether it works.</p>
<h2>How It Started</h2>
<p>In 2005, Congress passed the REAL ID Act. A year later, <a href="https://www.secureidnews.com/news-item/iowa-selects-digimarc-facial-recognition-solution-to-enforce-one-driver-one-license/">the Iowa DOT awarded a
$1.4 million contract to Digimarc</a> for facial recognition technology.
The system was sold to the public as a fraud-prevention tool, but the contract
embedded capabilities well beyond that purpose:</p>
<blockquote>
<p>Iowa DOT will implement both “one-to-one” and “one-to-many” facial recognition
as part of its driver license enrollment process.</p>
</blockquote>
<p>“One-to-one” matching — comparing a renewal photo to the applicant’s prior
photo — is the anti-fraud use case the DOT advertised. “One-to-many” matching is
something else entirely: it scans each new portrait against the full database of
driver’s license images. As the press release noted:</p>
<blockquote>
<p>Each night, the Biometric Identification system checks each newly captured
portrait against the full database of driver license images as another means
to catch attempts by a single individual to get a driver license under
multiple names.</p>
</blockquote>
<p>The DOT pitched this to the public as a civil anti-fraud measure. But it also
built out infrastructure with latent capabilities for criminal investigation—
and, as it turns out, civil immigration enforcement—capabilities it would
formalize with law enforcement partners in the years to come.</p>
<p>By 2007, the nightly scans were <a href="https://who13.com/news/facial-recognition-dot-helps-catch-40-year-fugitive/">operational</a>. Digimarc, the original
vendor, was subsequently acquired through a chain of corporate mergers: first by
Safran’s Morpho division (later MorphoTrust USA), then by <a href="https://en.wikipedia.org/wiki/IDEMIA">IDEMIA</a>, which
<a href="https://www.prnewswire.com/news-releases/idemia-partners-with-iowa-department-of-transportation-to-launch-next-generation-mobile-id-technology-301973008.html">continues to partner with the Iowa DOT</a> as of 2024.</p>
<p>The algorithm has changed hands repeatedly, but neither the DOT nor any external
body has ever tested its accuracy for the purpose Iowa uses it — flagging
potential fraud from a pool of millions.</p>
<h2>The FBI Moves In</h2>
<p>In 2014, the Iowa Department of Public Safety signed an agreement with the DOT
to pay for an upgrade to its facial recognition system in exchange for access to
it.</p>
<p>According to <a href="https://www.perpetuallineup.org/jurisdiction/iowa">Georgetown Law’s <em>The Perpetual Lineup</em></a>, this gave DPS
authorized personnel the ability to run face recognition searches against Iowa’s
driver’s license photos.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<p>That same year, the DOT signed its <a href="https://footnote4a.org/blog/dot-frt/MOU-2014.pdf">first Memorandum of
Understanding</a> with the FBI, granting the Bureau
access to those same photos through its Facial Analysis, Comparison, and
Evaluation (FACE) Services unit. A <a href="https://www.gao.gov/products/gao-16-267">2016 GAO report</a> confirmed
that the FBI could request searches of Iowa’s driver’s license database.</p>
<p>The Iowa MoU was <a href="https://footnote4a.org/blog/dot-frt/FBI-DOT.pdf">updated in 2018</a>, superseding the
original agreement. Under its terms, the FBI submits a probe photo to the DOT,
the DOT searches its facial recognition database, and returns a set of candidate
photos and identities. The DOT agreed to process up to 15 photo requests per
day, but the number it actually processes is not known.</p>
<p>Iowa is hardly alone. In response to a FOIA request about Iowa’s program, the
FBI provided a stack of MoUs from other states instead of the Iowa-specific
records that would have been responsive.<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup> Those documents show that at
least fifteen states have signed similar agreements with the FBI.</p>
<p>By May 2019, 21 states had partnered with FBI FACE Services, giving the Bureau
access to <a href="https://www.gao.gov/products/gao-19-579t">over 641 million photos</a> across all searchable
repositories.</p>
<p>@<a href="https://footnote4a.org/blog/dot-frt/FBI-DOT.pdf" class="collapsible">MoUs provided by the FBI</a></p>
<h2>The Nightly Dragnet, to Start With</h2>
<p>The nightly scan is called the Automated Biometric Identification System (ABIS).
It has been running every night for eighteen years, telling the DOT’s Bureau of
Investigation &amp; Identity Protection (BIIP) who to investigate next — not because
there is any indication of fraud, but purely on the output of a commercial facial
recognition algorithm.</p>
<p>These investigations are warrantless and deeply invasive. DOT procedure
specifies:</p>
<blockquote>
<p>When a driver’s license case is first assigned for investigation, the
Investigator shall gather all pertinent documents and information related to
the investigation.</p>
<p>This includes the complete driving and vehicle ARTS records, specific driving
violation records, Accurint check from DPS, or a CLEAR report from a Bureau
investigator and criminal history to start with.</p>
<p>— Iowa DOT, <em>Procedures Related to Driver License Investigations</em>, p. 176</p>
</blockquote>
<p>@<a href="https://footnote4a.org/blog/dot-frt/manual.pdf" class="collapsible">Procedures Related to Driver License Investigations, p. 176</a></p>
<p>A commercial algorithm — for which we have no data regarding accuracy or
bias — says your photo looks like one of millions of others. On that basis alone,
a DOT investigator pulls your credit history, utility bills, social media posts,
criminal history, and every other detail they can find about you into a file. “To
start with.”</p>
<p>Although we still don’t have no data on the DOT’s system’s accuracy, we at least
have part of the story now: DOT records show that of 192 investigations opened
between January 2022 and November 2025 (excluding 19 still-open cases and one
duplicate):<sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup></p>
<ul>
<li>
<p>28 investigations (16%) resulted in no action whatsoever. No administrative
sanction, no criminal referral. The algorithm flagged these people, an
investigator pulled their credit histories and criminal records, and then
closed the file. Whether the subjects were ever told they’d been investigated
is unknown.</p>
</li>
<li>
<p>130 investigations (76%) resulted in administrative action only — mostly
license cancellations, but also 20 cases where the sole action was “Merge
Records,” which appears to be database housekeeping.</p>
</li>
<li>
<p>14 investigations (8%) resulted in criminal charges. That is 3.5 per year.
The charges are overwhelmingly misdemeanors: “Fraudulent Application for
DL/ID,” “False Application for DL/ID,” perjury. A handful involved more
serious offenses — identity theft, forgery, fraudulent practice. One case
resulted in no Iowa charges at all; the subject was extradited to Nebraska on
an existing warrant.</p>
</li>
<li>
<p>Zero convictions are recorded. The DOT’s spreadsheet tracks charges filed, not
final outcomes. After eighteen years and 192 documented investigations, the
agency still cannot say whether a single criminal referral from its facial
recognition program has ever resulted in a conviction.</p>
</li>
</ul>
<p>One additional detail stands out: in April 2025, an administrative action reads
“Notified Homeland Security and <abbr class="md-tooltip" data-tooltip="Iowa Department of Revenue">IA DOR</abbr>.”</p>
<p>The nightly scan, sold to the public as a fraud-prevention tool, appears to have
been used for federal immigration enforcement, as those agencies <a href="https://arstechnica.com/tech-policy/2025/11/us-gives-local-police-a-face-scanning-app-similar-to-one-used-by-ice-agents/">continue to
push facial recognition mobile app on local police</a>.</p>
<h2>Blind Faith in a Blind System</h2>
<p>Facial recognition algorithms are notoriously biased, performing worse on people
with brown or black skin than on those with white skin. This is a technical
reality, not an advocacy position.</p>
<p>In 2016, the Government Accountability Office examined the FBI’s facial
recognition program and <a href="https://www.gao.gov/products/gao-16-267">made six recommendations</a>. The GAO found
that the FBI had tested its system’s detection rate only for candidate lists of
50, and had no data on accuracy for smaller list sizes that users regularly
requested. The GAO also recommended the FBI determine whether the external state
systems it relies on — systems like Iowa’s — were sufficiently accurate.</p>
<p>The FBI disagreed. It told the GAO that its testing satisfied requirements for
providing investigative leads and that the Bureau lacked authority to set accuracy
requirements for external systems.</p>
<p>Three of the six GAO recommendations dealt with accuracy—a massive red flag for
a system that flags and investigates people based on algorithmic photo matches
selected from millions of candidates.</p>
<p>Two more dealt with transparency: the FBI had failed to publish required Privacy
Impact Assessments<sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup> and a System of Records Notice<sup class="footnote-ref"><a href="#footnote6">[6]</a><a class="footnote-anchor" id="footnote-ref6"></a></sup> — legally
mandated disclosures for a program handling tens of millions of Americans’
photos. DOJ eventually published the missing documents, though years late.</p>
<p>By 2019, <a href="https://www.gao.gov/products/gao-19-579t">only one of the six recommendations had been fully
implemented</a>. The FBI had begun conducting user audits but still
had not tested accuracy for smaller candidate lists, had not assessed external
partner systems, and had not conducted the recommended annual operational
reviews. The GAO maintained all five remaining recommendations were valid.</p>
<p>Iowa, for its part, did no better. In response to public records requests:</p>
<ul>
<li>The Iowa DOT and DPS each confirmed that the FBI never shared results of any
accuracy tests.</li>
<li>The Iowa DOT, despite having a “facial recognition analyst” on staff, never
performed its own accuracy testing.</li>
<li>Neither the DOT nor DPS ever solicited or received reports about the system’s
accuracy from the vendor. Their only information comes from general materials
provided, or published online, by the vendor.</li>
<li>DPS “[had] not yet adopted a final policy” governing its use of facial
recognition, on the grounds that it was waiting to determine “what uses may be
accurate or inaccurate, reliable or unreliable, appropriate or
inappropriate.”<sup class="footnote-ref"><a href="#footnote7">[7]</a><a class="footnote-anchor" id="footnote-ref7"></a></sup> That was in 2016. A decade later, it still hasn’t
looked at system accuracy—knowledge it claims is a prerequisite to regulation.</li>
</ul>
<p>The FBI did not respond to a FOIA request (other than with the stack of MoUs
from other states that were not part of the request).</p>
<p>As the ACLU of Minnesota <a href="https://www.aclu-mn.org/news/biased-technology-automated-discrimination-facial-recognition/">summarizes</a>: “Facial recognition automates
discrimination.” The agencies either believe their algorithm is infallible, or
they don’t care whether it’s accurate as long as it gets them an occasional
result. Substantial academic and technical literature on algorithmic bias goes
ignored, as does the federal government’s own accountability office.</p>
<h2>The Bigger Picture: National Mass Surveillance</h2>
<p>Iowa’s nightly scan is one node in a much larger system — one that has been
expanding steadily and is now accelerating.</p>
<p>The infrastructure began with REAL ID and the MoUs that gave the FBI access to
state driver’s license databases. In December 2025, Iowa was <a href="https://www.ktiv.com/2025/12/02/iowa-among-states-that-will-help-homeland-security-obtain-drivers-license-records/">one of four
states</a> that agreed to help the Trump administration gain access to
state driver’s license data through NLETS.<sup class="footnote-ref"><a href="#footnote8">[8]</a><a class="footnote-anchor" id="footnote-ref8"></a></sup></p>
<p>The deal was <a href="https://sos.iowa.gov/news-resources/iowa-secretary-state-statement-federal-lawsuit-settlement">part of a settlement</a> that allowed Iowa to upload its
voter rolls to the federal government for citizenship verification through
SAVE,<sup class="footnote-ref"><a href="#footnote9">[9]</a><a class="footnote-anchor" id="footnote-ref9"></a></sup> after the Secretary of State had flagged over two thousand
potential non-citizen voters by cross-referencing voter rolls with DOT records —
driver’s license application data that was, in many cases, years out of date.</p>
<p>Subsequent federal verification through SAVE confirmed only 277, roughly 12% of
those flagged based on the DOT’s REAL ID records.</p>
<p>Meanwhile, DHS has also declared that REAL ID—the system it spent twenty years
building these invasive, networked fraud-prevention and citizenship-verification
systems for—<a href="https://storage.courtlistener.com/recap/gov.uscourts.alsd.76579/gov.uscourts.alsd.76579.44.1.pdf">is not fit for purpose</a>.</p>
<p>In a December 2025 court filing, a DHS official stated that “REAL ID can be
unreliable to confirm U.S. citizenship” in response to a lawsuit by an
American citizen who was <a href="https://reason.com/2025/12/31/dhs-says-real-id-which-dhs-certifies-is-too-unreliable-to-confirm-u-s-citizenship/">detained twice during immigration raids</a>
despite presenting his valid REAL ID.</p>
<p>What immigration enforcement now demands is being filled by facial recognition.
ICE agents carry <a href="https://www.404media.co/you-cant-refuse-to-be-scanned-by-ices-facial-recognition-app-dhs-document-says/">Mobile Fortify</a>, a smartphone app that reportedly
scans faces against over 200 million images across DHS, FBI, and State
Department databases.</p>
<p>DHS does not let subjects decline to be scanned, and photos — including those of
U.S. citizens — are stored for fifteen years. CBP has gone further, releasing
<a href="https://www.404media.co/cbp-quietly-launches-face-scanning-app-for-local-cops-to-do-immigration-enforcement/">Mobile Identify</a>, a separate facial recognition app available to
state and local police agencies deputized for immigration enforcement through
287(g) agreements.</p>
<p>The federal government and state DMVs spent twenty years laying the groundwork
for all of this while Presidents, Governors, and members of Congress rotated in
and out of service. The MoUs. The nightly scans.  The databases quietly compiled
from photos taken to get permission to drive — or, for non-operator ID holders,
simply to prove who they are.</p>
<p>Iowa’s program is not an outlier. It is the foundation. It is twenty years of
federally funded research, data collection, and algorithmic lineups that, by
the government’s own accounting, is unreliable and serves no significant public
purpose.</p>
<hr>
<p>Iowa’s DOT does not limit itself to <a href="https://footnote4a.org/news/dot-permits">approving questionable
permits</a> for police surveillance cameras and <a href="https://footnote4a.org/news/dot-permits-pt2">waiving
roadside safety standards</a> to accommodate them. Through
its Motor Vehicle Division, it also operates one of the most invasive automated
surveillance programs in the state.</p>
<p>For 3.5 criminal charges per year — overwhelmingly misdemeanors, with no
recorded convictions — and 28 investigations that led nowhere at all, every new
driver’s license photo in Iowa enters the nightly automated lineup, and, along
with it, the database that federal, state, and local police across the country
can access on demand.</p>
<p>Whether you’re an immigrant or have never left Ottumwa, if IDEMIA’s computer
says you’re a suspect, the government will find out everything there is to know
about you—to start with.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>The DOT delivered outcome data on February 10, 2026, over a month past
its self-imposed early January deadline. The data covered January 2022 through
November 2025. The full spreadsheet is linked above. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Georgetown’s <em>The Perpetual Lineup</em> reported 13 million driver’s license photos
in the system as of 2016. A 2013 <em>Gazette</em> <a href="https://www.thegazette.com/2013/07/03/iowa-dot-using-facial-recognition-technology/">report</a>
put the figure at 12 million photos representing approximately 2.1 million
individuals — the discrepancy with Iowa’s population of roughly 3.2 million
reflects the accumulation of historical photos, including expired licenses and
prior images retained in the database. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>The FOIA request specifically sought Iowa-related records. The FBI’s
production of MoUs from other states — while non-responsive to the request —
inadvertently confirmed the breadth of the program. The responsive
Iowa-specific records were not produced. The FBI did not provide additional
context for these records. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>Case C27411 bears a 2025 date but its case number suggests it originated in 2022. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>Privacy Impact Assessment, a systematic assessment of a project that identifies
potential privacy impacts and recommends ways to manage, minimize, or eliminate them. <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote6" class="footnote-item"><p>System of Records Notice, a document required by the Privacy Act of 1974 that informs
the public about federal agency systems of records containing personally identifiable
information. <a href="#footnote-ref6" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote7" class="footnote-item"><p>Georgetown Law Center on Privacy &amp; Technology, <em>The Perpetual Lineup</em> (2016). <a href="#footnote-ref7" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote8" class="footnote-item"><p>The National Law Enforcement Telecommunications System; a nationwide
computer network that allows law enforcement agencies to search records
across state lines. <a href="#footnote-ref8" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote9" class="footnote-item"><p>Systematic Alien Verification for Entitlements. A federal immigration
status database created in 1986. <a href="#footnote-ref9" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[The Many Faces of Flock Permits (Part II)]]></title>
            <link>https://footnote4a.org/news/dot-permits-pt2</link>
            <guid isPermaLink="false">https://footnote4a.org/news/dot-permits-pt2</guid>
            <pubDate>Fri, 06 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Iowa has highway safety standards. Kind of.]]></description>
            <content:encoded><![CDATA[<p>The Iowa DOT has a utility accommodation program. It has regulations governing
that program. It has forms with safety standards printed right on them. It even
has a process for verifying that permitted installations comply with those
standards. What it does not have is any apparent interest in using any of it.</p>
<p>Back in November, I wrote about <a href="https://footnote4a.org/news/dot-permits">the Iowa DOT’s lack of a consistent permitting
process</a>. Further research shows that the DOT also lacks a
verification process and an inspection process. The permits it does issue are
approved based on plans that violate the safety standards printed on the
application itself.</p>
<p>In the article <em><a href="https://www.jsheld.com/insights/articles/what-is-the-clear-zone-and-why-is-it-critical-to-roadway-safety">What Is the Clear Zone and Why Is It Critical to Roadway
Safety?</a></em>, John Carlton, a licensed Professional Engineer, discusses
“why the clear zone is important to the safety of roadway users and provide
examples of commonly experienced violations that have resulted in personal
injury litigation.”</p>
<p><img src="https://footnote4a.org/blog/dot-permits-pt2/table.png" alt="Table with clear zone distances included in DOT permit applications" class="collapsible"></p>
<p>This table is included on DOT’s standard utility accommodation form and shows the
clear zone distances (ADT = Average Daily Traffic). The numbers matter: they are
the minimum distance between a roadside obstacle and the travel lane that gives
a driver a reasonable chance of recovery in a run-off-road event.</p>
<h2>The Missing Permits</h2>
<p>As noted in the <a href="https://footnote4a.org/news/dot-permits">previous article</a>, the information in the
permit applications for roadside cameras is sketchy at best. In some cases,
they’re sketched-up screenshots of Google Maps by a Sheriff’s Deputy, and signed
off on by the Sheriff, with little to no helpful descriptive information.</p>
<p><img src="https://footnote4a.org/blog/dot-permits-pt2/plans.png" alt="Site plans approved by the DOT"></p>
<p>The plans above were submitted to, and approved by, the Iowa DOT.</p>
<p>The middle image shows the clearest violation: the minimum “acceptable clear
zone” area, listed on the very form the permit was submitted on, is 12 feet.
The plan shows “10–12 feet.” The DOT approved it anyway.</p>
<h2>The Missing Failsafes</h2>
<p>But at least there are failsafes. On paper. After construction, the DOT’s
regulations require an “as-built” plan to be submitted with a certified
engineer’s stamp. If a plan is not submitted, the DOT is authorized to perform
an inspection at the permittee’s expense. This would uncover any shoddy work by
unqualified site planners and straighten out any problems with approvals.</p>
<p><img src="https://footnote4a.org/blog/dot-permits-pt2/as-built.png" alt="An installed roadside camera"></p>
<p>It turns out that the DOT does not follow its own regulations. Instead, it has
replaced regulation with policy. In the words of my formal complaint:</p>
<blockquote>
<p>For equipment installed under the utility accommodation program, Iowa Admin.
Code 761—115.7(8) (2025) requires the utility owner “to submit to the
department an as-built plan in an electronic format in accordance with
department specifications.”</p>
<p>Iowa DOT writes that it maintains a policy that “[w]hen not submitted we
accept the permitted plans as the asbuilt plan if the permittee did not
contact us with a change.”</p>
<p>Iowa DOT confirms that for this installation “no as-builts were submitted,”
and explains that “we identify the permitted plans as the as-builts.”</p>
</blockquote>
<p>In other words: Iowa DOT does nothing, even when the camera is obviously
installed in a way that appears unsafe. If it <em>is</em> somehow compliant, there is
no information in any of the DOT’s records that would demonstrate that
compliance.</p>
<p>It approves permits proposing non-compliant installations for “utilities” that
are owned by private corporations and deliver no service to the public, based on
the say-so of police officers and sheriff’s deputies.</p>
<p>To make matters worse, Flock—the contractor listed on many of these permits—is
not even a licensed contractor in the State of Iowa.</p>
<h2>The DOT’s Response</h2>
<p>I brought these issues to the attention of Iowa DOT director Scott
Marler.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p class="collapsible">@<a href="https://footnote4a.org/blog/dot-permits-pt2/dot-letter.pdf">January 12, 2026, letter to the Iowa DOT</a>
@<a href="https://footnote4a.org/blog/dot-permits-pt2/A-22A-2024-016.pdf" class="collapsible">Exhibit A — 22A-2024-016</a>
@<a href="https://footnote4a.org/blog/dot-permits-pt2/B-33A-2024-014_33A-2024-014.pdf" class="collapsible">Exhibit B — 33A-2024-014</a>
@<a href="https://footnote4a.org/blog/dot-permits-pt2/C-Installation.pdf" class="collapsible">Exhibit C — Installation</a>
@<a href="https://footnote4a.org/blog/dot-permits-pt2/D-CarlislePD.pdf" class="collapsible">Exhibit D — Carlisle PD</a>
@<a href="https://footnote4a.org/blog/dot-permits-pt2/E-Checklist.pdf" class="collapsible">Exhibit E — Checklist</a>
@[Exhibit F — Altoona PD TCD Application](/blog/dot-permits-pt2/F-Altoona PD TCD Application Signed_08302022.pdf){.collapsible}
@<a href="https://footnote4a.org/blog/dot-permits-pt2/G-Flock.pdf" class="collapsible">Exhibit G — Flock</a>
@[Exhibit H — DOT Emails](/blog/dot-permits-pt2/H-DOT Emails.pdf)</p>
<p>His responses met expectations:</p>
<blockquote>
<p>The Iowa Department of Transportation acknowledges receipt of your request, sent
to Director Marler on January 12, 2026.</p>
<p>We understand the importance of establishing a formal policy for license plate
readers and have been actively working on this matter since last fall. At that
time, we prohibited any additional installations of LPR’s on DOT ROW until the
policy is put in place.</p>
<p>We aim to finalize our ALPR policy by the end of February. We appreciate your
expertise and insights on this subject and will ensure that our policy team
has access to review your contributions.</p>
</blockquote>
<p>To which I replied:</p>
<blockquote>
<p>Thank you for the response. While I appreciate that the Department is drafting
a specific ALPR policy, the core of my concern is not a lack of policy, but a
systemic failure to enforce existing Iowa Code and Administrative Rules.</p>
<p>The DOT recently finalized its EO10 review, affirming that the existing
regulations—including those governing the Utility Accommodation Program and
contractor licensing—are necessary and effective. A new policy cannot
retroactively excuse the Department’s decision to ignore those regulations and
standards.</p>
<p>Regarding the “prohibition” on new installations, there appears to be a
disconnect. Since the date you claim a prohibition was enacted, Flock has
expanded its network along the I-380 corridor in Cedar Rapids, including in
the I-380 ROW on state-owned land, and in other municipalities.</p>
<p>If the DOT has been working on this issue since last fall, it raises the
question of why the Department continues to allow unlicensed contractors to
perform work and why these specific permits were not stayed or denied.</p>
<p>By declining to act in a meaningful way while unsafe installations (like the
non-compliant “breakaway pole” on Hwy 52) put drivers at risk, the DOT is
tacitly approving these hazards. In doing so, the Department assumes
significant legal and financial liability for the State should a collision
involving this equipment occur and foreseeably result in injury or death.</p>
</blockquote>
<p>Note the DOT’s claim that it “prohibited any additional installations” since
last fall. Since that date, Flock has expanded its camera network along the
I-380 corridor in Cedar Rapids—including on state-owned land in the I-380
right-of-way—and in other municipalities. The moratorium appears to exist only
in the DOT’s correspondence.</p>
<p>The DOT’s final response:</p>
<blockquote>
<p>We greatly appreciate the time and effort you have invested in bringing these
matters to our attention. Please be assured that we are investigating your
allegations.</p>
</blockquote>
<p>I will be sending in an open records request for the DOT’s new policy at the end
of the month for Part III in this series, unless someone beats me to it.</p>
<p>If you’re in Iowa and you crash your car into a roadside camera, be sure to tell
your lawyer about this post.</p>
<h2>Permit Documents</h2>
<p>The table below lists every LPR permit I have obtained from the Iowa DOT. This
may be a complete set; it is emphatically not a complete accounting of cameras
installed in DOT right-of-way. Many appear to lack permits entirely.</p>
<table>
<thead>
<tr>
<th>Date</th>
<th>Permit / Municipality</th>
<th>Route</th>
</tr>
</thead>
<tbody>
<tr>
<td>2022-04-08</td>
<td>IA-136 LPR</td>
<td>IA-136</td>
</tr>
<tr>
<td>2022-04-08</td>
<td>US-30 LPR</td>
<td>US-30</td>
</tr>
<tr>
<td>2022-08-30</td>
<td>Altoona PD — TCD Application CCP</td>
<td>—</td>
</tr>
<tr>
<td>2022-08-30</td>
<td>Altoona PD — TCD Application</td>
<td>—</td>
</tr>
<tr>
<td>2023-01</td>
<td>Council Bluffs US-275 — LPR TCD</td>
<td>US-275</td>
</tr>
<tr>
<td>2023-01-17</td>
<td>Council Bluffs — Admin</td>
<td>—</td>
</tr>
<tr>
<td>2023-01-24</td>
<td>Council Bluffs US-275 — LPR TCD Approved</td>
<td>US-275</td>
</tr>
<tr>
<td>2023-05-08</td>
<td>Permit</td>
<td>—</td>
</tr>
<tr>
<td>2023-05-30</td>
<td>South Sioux City PD — Woodbury County</td>
<td>—</td>
</tr>
<tr>
<td>2023-10-06</td>
<td>Ankeny PD — LPR Application</td>
<td>—</td>
</tr>
<tr>
<td>2023-10-06</td>
<td>TCD Application</td>
<td>—</td>
</tr>
<tr>
<td>2023-12-22</td>
<td>85A-2023-034 — Story County</td>
<td>US-30</td>
</tr>
<tr>
<td>2023-12-22</td>
<td>Story County Flock TCD</td>
<td>—</td>
</tr>
<tr>
<td>2024-01</td>
<td>Pleasant Hill PD</td>
<td>—</td>
</tr>
<tr>
<td>2024-01</td>
<td>Pleasant Hill</td>
<td>US-65</td>
</tr>
<tr>
<td>2024-01-23</td>
<td>Pleasant Hill</td>
<td>IA-163</td>
</tr>
<tr>
<td>2024</td>
<td>Indianola — LPR Application</td>
<td>—</td>
</tr>
<tr>
<td>2024-05-10</td>
<td>483754 — Marshalltown PD</td>
<td>IA-14</td>
</tr>
<tr>
<td>2024-05-10</td>
<td>502480 — Newton PD</td>
<td>—</td>
</tr>
<tr>
<td>2024-06</td>
<td>Altoona</td>
<td>—</td>
</tr>
<tr>
<td>2024-06-25</td>
<td>Polk City PD</td>
<td>—</td>
</tr>
<tr>
<td>2024-10-25</td>
<td>96A-2024-011 — Winneshiek County, Decorah</td>
<td>IA-9</td>
</tr>
<tr>
<td>2024-10-25</td>
<td>Fayette County, West Plum St</td>
<td>IA-150</td>
</tr>
<tr>
<td>2024-10-25</td>
<td>Fayette County, E Bradford St</td>
<td>US-18</td>
</tr>
<tr>
<td>2024-11-04</td>
<td>33A-2024-014 — Fayette County, Major Rd</td>
<td>IA-150</td>
</tr>
<tr>
<td>2024-11-04</td>
<td>Fayette County, W Ave</td>
<td>IA-3</td>
</tr>
<tr>
<td>2024-11-15</td>
<td>Fayette County, S Avenue</td>
<td>IA-3</td>
</tr>
<tr>
<td>2024</td>
<td>19A-2024-008 — Fayette County</td>
<td>US-63</td>
</tr>
<tr>
<td>2024</td>
<td>19U-2024-009 — Fayette County NHSX</td>
<td>US-63</td>
</tr>
<tr>
<td>2024</td>
<td>19U-2024-009 — Fayette County</td>
<td>US-63</td>
</tr>
<tr>
<td>2024</td>
<td>22A-2024-016 — Fayette County</td>
<td>US-52</td>
</tr>
<tr>
<td>2024</td>
<td>33A-2024-009 — Fayette County</td>
<td>US-18</td>
</tr>
<tr>
<td>2024</td>
<td>33A-2024-010 — Fayette County</td>
<td>IA-150</td>
</tr>
<tr>
<td>2024</td>
<td>33A-2024-013 — Fayette County</td>
<td>IA-3</td>
</tr>
<tr>
<td>2024</td>
<td>33A-2024-014 — Fayette County</td>
<td>IA-150</td>
</tr>
<tr>
<td>2024</td>
<td>33A-2024-015 — Fayette County</td>
<td>IA-3</td>
</tr>
<tr>
<td>2024</td>
<td>3A-2024-008 — Fayette County</td>
<td>US-18</td>
</tr>
<tr>
<td>2024</td>
<td>45U-2024-004 — Fayette County</td>
<td>US-63</td>
</tr>
<tr>
<td>2024</td>
<td>96A-2024-011 — Fayette County</td>
<td>IA-9</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>Sioux City PD</td>
<td>IA-12</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>Storm Lake PD — PTZ and LPR</td>
<td>—</td>
</tr>
<tr>
<td>2024-12-16</td>
<td>Woodbury County SO</td>
<td>—</td>
</tr>
<tr>
<td>2025-02-11</td>
<td>Wapello County SO</td>
<td>—</td>
</tr>
<tr>
<td>2025-02-20</td>
<td>91A-2025-006 — Warren County SO</td>
<td>—</td>
</tr>
<tr>
<td>2025-02-20</td>
<td>Carlisle PD</td>
<td>—</td>
</tr>
<tr>
<td>2025-05-11</td>
<td>29A-2025-001 — Burlington</td>
<td>US-34</td>
</tr>
<tr>
<td>2025</td>
<td>33A-2025-002 — Fayette County</td>
<td>IA-150</td>
</tr>
<tr>
<td>2025</td>
<td>36A-2025-004 — Fremont County</td>
<td>—</td>
</tr>
</tbody>
</table>
<p class="collapsible">@[April 8, 2022 — IA-136 LPR](/dot-permits/2022.04.08 - IA-136 LPR.pdf){.collapsible}
@[April 8, 2022 — US-30 LPR](/dot-permits/2022.04.08 - US-30 LPR.pdf){.collapsible}
@[August 30, 2022 — Altoona PD — TCD Application CCP](/dot-permits/2022.08.30 - Altoona PD - TCD Application CCP.pdf){.collapsible}
@[August 30, 2022 — Altoona PD — TCD Application](/dot-permits/2022.08.30 - Altoona PD - TCD Application.pdf){.collapsible}
@[January 2023 — Council Bluffs US-275 — LPR TCD](/dot-permits/2023.01 - Council Bluffs US-275 - LPR TCD.pdf){.collapsible}
@[January 17, 2023 — Council Bluffs — Admin](/dot-permits/2023.01.17 - Council Bluffs - Admin.pdf){.collapsible}
@[January 24, 2023 — Council Bluffs US-275 — LPR TCD Approved](/dot-permits/2023.01.24 - Council Bluffs US-275 - LPR TCD Approved.pdf){.collapsible}
@[May 8, 2023 — Permit](/dot-permits/2023.05.08 - Permit.pdf){.collapsible}
@[May 30, 2023 — South Sioux City PD — Woodbury County](/dot-permits/2023.05.30 - South Sioux City PD - Woodbury County.pdf){.collapsible}
@[October 6, 2023 — Ankeny PD — LPR Application](/dot-permits/2023.10.06 - Ankeny PD - LPR Application.pdf){.collapsible}
@[October 6, 2023 — TCD Application](/dot-permits/2023.10.06 - TCD Application.pdf){.collapsible}
@[December 22, 2023 — 85A-2023-034 — Story County US-30](/dot-permits/2023.12.22 - 85A-2023-034 - Story County US-30.pdf){.collapsible}
@[December 22, 2023 — Story County Flock TCD](/dot-permits/2023.12.22 - Story County Flock TCD.pdf){.collapsible}
@[January 2024 — Pleasant Hill PD](/dot-permits/2024.01 - Pleasant Hill PD.pdf){.collapsible}
@[January 2024 — Pleasant Hill US-65](/dot-permits/2024.01 - Pleasant Hill US-65.pdf){.collapsible}
@[January 23, 2024 — Pleasant Hill IA-163](/dot-permits/2024.01.23 - Pleasant Hill IA-163.pdf){.collapsible}
@[2024 — Indianola — LPR Application](/dot-permits/2024 - Indianola - LPR Application.pdf){.collapsible}
@[May 10, 2024 — 483754 — Marshalltown PD IA-14](/dot-permits/2024.05.10 - 483754 - Marshalltown PD IA-14.pdf){.collapsible}
@[May 10, 2024 — 502480 — Newton PD](/dot-permits/2024.05.10 - 502480 - Newton PD.pdf){.collapsible}
@[June 2024 — Altoona](/dot-permits/2024.06 - Altoona.pdf){.collapsible}
@[June 25, 2024 — Polk City PD](/dot-permits/2024.06.25 - Polk City PD.pdf){.collapsible}
@[October 25, 2024 — 96A-2024-011 — Winneshiek County IA-9 Decorah](/dot-permits/2024.10.25 - 96A-2024-011 - Winneshiek County IA-9 Decorah.pdf){.collapsible}
@[October 25, 2024 — Fayette County IA-150 West Plum St](/dot-permits/2024.10.25 - Fayette County IA-150 West Plum St.pdf){.collapsible}
@[October 25, 2024 — Fayette County US-18 E Bradford St](/dot-permits/2024.10.25 - Fayette County US-18 E Bradford St.pdf){.collapsible}
@[November 4, 2024 — 33A-2024-014 — Fayette County IA-150 Major Rd](/dot-permits/2024.11.04 - 33A-2024-014 - Fayette County IA-150 Major Rd.pdf){.collapsible}
@[November 4, 2024 — Fayette County IA-3 W Ave](/dot-permits/2024.11.04 - Fayette County IA-3 W Ave.pdf){.collapsible}
@[November 15, 2024 — Fayette County IA-3 S Avenue](/dot-permits/2024.11.15 - Fayette County IA-3 S Avenue.pdf){.collapsible}
@[2024 — 19A-2024-008 — Fayette County US-63](/dot-permits/2024 - 19A-2024-008 - Fayette County US-63.pdf){.collapsible}
@[2024 — 19U-2024-009 — Fayette County US-63 NHSX](/dot-permits/2024 - 19U-2024-009 - Fayette County US-63 NHSX.pdf){.collapsible}
@[2024 — 19U-2024-009 — Fayette County US-63](/dot-permits/2024 - 19U-2024-009 - Fayette County US-63.pdf){.collapsible}
@[2024 — 22A-2024-016 — Fayette County US-52](/dot-permits/2024 - 22A-2024-016 - Fayette County US-52.pdf){.collapsible}
@[2024 — 33A-2024-009 — Fayette County US-18](/dot-permits/2024 - 33A-2024-009 - Fayette County US-18.pdf){.collapsible}
@[2024 — 33A-2024-010 — Fayette County IA-150](/dot-permits/2024 - 33A-2024-010 - Fayette County IA-150.pdf){.collapsible}
@[2024 — 33A-2024-013 — Fayette County IA-3](/dot-permits/2024 - 33A-2024-013 - Fayette County IA-3.pdf){.collapsible}
@[2024 — 33A-2024-014 — Fayette County IA-150](/dot-permits/2024 - 33A-2024-014 - Fayette County IA-150.pdf){.collapsible}
@[2024 — 33A-2024-015 — Fayette County IA-3](/dot-permits/2024 - 33A-2024-015 - Fayette County IA-3.pdf){.collapsible}
@[2024 — 3A-2024-008 — Fayette County US-18](/dot-permits/2024 - 3A-2024-008 - Fayette County US-18.pdf){.collapsible}
@[2024 — 45U-2024-004 — Fayette County US-63](/dot-permits/2024 - 45U-2024-004 - Fayette County US-63.pdf){.collapsible}
@[2024 — 96A-2024-011 — Fayette County IA-9](/dot-permits/2024 - 96A-2024-011 - Fayette County IA-9.pdf){.collapsible}
@[December 16, 2024 — Sioux City PD IA-12](/dot-permits/2024.12.16 - Sioux City PD IA-12.pdf){.collapsible}
@[December 16, 2024 — Storm Lake PD — PTZ and LPR](/dot-permits/2024.12.16 - Storm Lake PD - PTZ and LPR.pdf){.collapsible}
@[December 16, 2024 — Woodbury County SO](/dot-permits/2024.12.16 - Woodbury County SO.pdf){.collapsible}
@[February 11, 2025 — Wapello County SO](/dot-permits/2025.02.11 - Wapello County SO.pdf){.collapsible}
@[February 20, 2025 — 91A-2025-006 — Warren County SO](/dot-permits/2025.02.20 - 91A-2025-006 - Warren County SO.pdf){.collapsible}
@[February 20, 2025 — Carlisle PD](/dot-permits/2025.02.20 - Carlisle PD.pdf){.collapsible}
@[May 11, 2025 — 29A-2025-001 — Burlington US-34](/dot-permits/2025.05.11 - 29A-2025-001 - Burlington US-34.pdf){.collapsible}
@[2025 — 33A-2025-002 — Fayette County IA-150](/dot-permits/2025 - 33A-2025-002 - Fayette County IA-150.pdf){.collapsible}
@[2025 — 36A-2025-004 — Fremont County](/dot-permits/2025 - 36A-2025-004 - Fremont County.pdf)</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>I have previously brought several matters to the attention of
Director Marler. In 2020, I petitioned him to amend rules governing the
DOT’s flawed immigration database. He declined, which contributed to the
widely-reported <a href="https://sos.iowa.gov/news-resources/statement-secretary-state-paul-pate-noncitizen-voting">discovery of 2,207 non-citizen voters</a> in 2024—a
number that turned out to be <a href="https://sos.iowa.gov/news-resources/iowa-secretary-states-audit-voter-registration-lists-finds-277-confirmed-noncitizens">just 277</a> because of the very flaw I
had identified. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock's New Pitch: Surveillance or Serial Killers]]></title>
            <link>https://footnote4a.org/news/surveillance-or-serial-killers</link>
            <guid isPermaLink="false">https://footnote4a.org/news/surveillance-or-serial-killers</guid>
            <pubDate>Fri, 09 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[A TV ad, a recycled op-ed, and the quiet admission that guardrails don't actually work.]]></description>
            <content:encoded><![CDATA[<p>We’ve seen some unhinged messaging from Flock in the past few weeks, including
the email to Staunton, VA in which Flock’s CEO, Garrett Langley, told police
that they’re under attack from “<a href="https://footnote4a.org/news/staunton-attack">activist groups who want to defund the police, weaken
public safety, and normalize lawlessness</a>.” Flock seems to have
taken the brakes off its paranoid insanity with TV ads and reposted op-eds.</p>
<p>Let’s start with the TV-ad. A <a href="https://deflock.me">DeFlock</a> Discord user posted the following
screenshots, saying an ad showed on his Smart TV to tell him “We’re all lucky other cities in
Massachusetts haven’t followed Cambridge’s lead in removing these lifesaving devices, else a serial
killer would get you!”</p>
<div class="grid grid-cols-2">
    <img alt="TV showing 'We're all pretty lucky, though, that other cities in'" src="https://footnote4a.org/blog/surveillance-or-serial-killers/tv-ad-2.jpg">
    <img alt="TV showing 'haven't followed Cambridge's lead, or else a serial killer'" src="https://footnote4a.org/blog/surveillance-or-serial-killers/tv-ad-3.png">
</div>
<p>The TV ad appears to actually exist. It quotes an op-ed published in the Boston Globe and
<a href="https://archive.is/NTOTl">republished on Flock’s website</a>:</p>
<blockquote>
<p>[L]eft-leaning jurisdictions have turned against Flock cameras lately, concerned that the data they
generate could be used by immigration authorities to find immigrants living in the country without
authorization. We’re all pretty lucky, though, that other cities in Massachusetts haven’t followed
Cambridge’s lead, or else a serial killer might still be on the loose.</p>
</blockquote>
<p>This is a multi-billion dollar organization that has historically steered (more or less) clear of
politics—at least publicly. Until now.</p>
<h2>The Op-Ed</h2>
<p>I want to briefly touch on the content of Alan Wirzbicki’s reposted op-ed itself. The rhetorical
strategy is the typical cherry-picking. Select a success story—in this case, a murderer being
apprehended—and use it to justify the entire system as though it is the only possible thing that
could have possibly led to this outcome. It’s a tired and dishonest argument.</p>
<blockquote>
<p>left-leaning jurisdictions have turned against Flock cameras lately, concerned that the data they
generate could be used by immigration authorities to find immigrants living in the country
without authorization.</p>
</blockquote>
<p>It’s true that left-leaning jurisdictions have this concern. It’s a concern that is founded in
multiple high-profile incidents where <a href="https://www.404media.co/ice-taps-into-nationwide-ai-enabled-camera-network-data-shows/">Flock transfered information to the federal government</a>
without permission and in violation of law. The guardrails failed. Flock failed.</p>
<p>But “the left” is not the only group disturbed by mass surveillance. In other cases, police have
used electronic and mass surveillance to target right-wing groups.</p>
<p>These cameras don’t discriminate. They’ll track Antifa. They’ll also track the Proud Boys.</p>
<p>They will track law-abiding citizens on their way to Planned Parenthood or the gun store.</p>
<p>Left, right, we’re all suspects.</p>
<p>The author of the op-ed seems to have a brief moment of clarity when he notes that, despite Flock’s
assurances, the guardrails on this technology are fundamentally worthless:</p>
<blockquote>
<p>[G]uardrails or no, it’s hard for me to believe that municipalities could actually prevent
immigration authorities from accessing their Flock data if the feds really wanted it badly enough.</p>
</blockquote>
<p>But then he goes on:</p>
<blockquote>
<p>But at least to me, license plate readers are a much less threatening form of government
surveillance than, say, facial recognition software and cameras that scan crowds of people.</p>
</blockquote>
<p>He fails to connect his own dots. Regardless of what Flock offers as a service today, the capability
to record conversations and apply facial recognition across 250,000+ cameras and microphones is
there for the taking “if the feds really wanted it badly enough.”</p>
<p>Whether you’re in a “left-leaning” or a “right-leaning” city, once the cameras are up and the data
is being harvested, one thing is certain: there’s no take-backsies when the next guy takes office.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock's Censorship Gambit Fails at Cloudflare (Part V)]]></title>
            <link>https://footnote4a.org/news/cyble-part5</link>
            <guid isPermaLink="false">https://footnote4a.org/news/cyble-part5</guid>
            <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[After three weeks of review, Cloudflare rejects Cyble's baseless takedown complaint—citing Flock's own admission that the data came from public records.]]></description>
            <content:encoded><![CDATA[<p>After more than three weeks of investigation, Cloudflare has dismissed the baseless complaint filed
by Cyble, on Flock’s behalf, in an attempt to remove this website from the Internet. If you missed
parts one through four, here are the links:</p>
<div class="markdown-alert markdown-alert-note">
<p class="markdown-alert-title">Note</p>
<p><strong>February 5, 2025</strong>: The last email to Hetzner was on December 30. There has been no response and
it is unclear if they are still investigating. Hetzner never forwarded the document showing the
supposed relationship between Flock and Cyble.</p>
</div>
<ul>
<li>Part I: <a href="https://footnote4a.org/news/cyble-downtime">Flock and Cyble Inc. Weaponize “Cybercrime” Takedowns to Silence Critics</a> (Dec. 16)</li>
<li>Part II: <a href="https://footnote4a.org/news/cyble-part2">Flock and Cyble Inc. Continue to File False Notices</a> (Dec. 17)</li>
<li>Part III: <a href="https://footnote4a.org/news/cyble-part3">Flock and Cyble Inc. Pile on the Allegations with no Evidence in Sight</a> (Dec. 29)</li>
<li>Part IV: <a href="https://footnote4a.org/news/cyble-part4">Flock and Cyble: Aligned Values</a> (Dec. 31)</li>
</ul>
<p>The <em>tl;dr</em> is that Flock hired<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> Cyble to file takedown notices. This site’s original host, Cloudflare,
put a “phishing” interstitial on the site on December 16. The site moved to Hetzner while the takedown
was appealed. Cyble filed a complaint with Hetzner a day later.</p>
<p>Hetzner is still conducting its review (while the site remains online).</p>
<p>Cloudflare’s review is now complete:</p>
<blockquote>
<p>Upon further investigation, we have granted your appeal and we can confirm the restricted access to
the reported URL was removed on 01/08/2026.</p>
<p>Separately, we had contacted you regarding a potential violation of our Developer Platform Terms of
Service, which prohibit “content that discloses sensitive personal information.” This was in response
to a report claiming that “the website publicly and deliberately releases extensive sensitive information
obtained from Flock.”</p>
<p>Thank you for providing additional information, including a Flock Safety customer communication stating
that, “Based on what we have seen, websites like the one circulating online are using agency-released
public-records data.”</p>
<p>Based on our review, including the additional information provided, we found insufficient evidence of
a violation.</p>
<p>Thank you for your understanding and patience while we worked through this process.</p>
</blockquote>
<p>The “Flock Safety customer communication” Cloudflare cites is included below; it was obtained via an
Illinois FOIA request by <a href="https://www.lucyparsonslabs.com/">Lucy Parsons Labs</a> and <a href="https://www.muckrock.com/foi/mount-prospect-8189/flocksafety-emails-12-2025-mount-prospect-police-department-200393/">published on Muckrock</a>.</p>
<p>@<a href="https://footnote4a.org/blog/colwell-files/email.pdf">Flock customer email</a></p>
<p>Cloudflare got this one right. So did Flock’s own customer communications team, apparently.</p>
<p>Hetzner’s review continues while the site remains online.</p>
<p>To everyone who has continued to <a href="https://footnote4a.org/about/audit-logs">demand transparency</a> and accountability while Flock
invokes “officer safety” as a silencing mechanism: this is what winning looks like. It’s not a final
victory—just one less vector for censorship.</p>
<p>The public records remain public.</p>
<p>We’re just getting started.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Though whether Flock actually “hired” Cyble is technically unclear. See <a href="https://footnote4a.org/news/cyble-part4">Part IV</a>. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Has Flock Been Hacked? What Their Security Blog Post Doesn't Say]]></title>
            <link>https://footnote4a.org/news/never-hacked-facts</link>
            <guid isPermaLink="false">https://footnote4a.org/news/never-hacked-facts</guid>
            <pubDate>Tue, 06 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Flock claims it has "never been hacked." A fact-check of their January 2026 blog post reveals semantic games, undisclosed offshore contractors, and CJIS compliance failures.]]></description>
            <content:encoded><![CDATA[<p>“<a href="https://archive.is/oXy79">Has Flock Been Hacked?</a>” is the question the Flock Safety Blog asked itself today. The
article is a transparent<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> attempt to get ahead of the <abbr class="md-tooltip" data-tooltip="Search Engine Optimization">SEO</abbr> game. It repeats the same
tired points, and so will this fact-check, but such is the nature of fighting misinformation and
disinformation on the Internet.</p>
<p>The executive summary:</p>
<table>
<thead>
<tr>
<th>Flock Claim</th>
<th>Reality</th>
<th>Source</th>
</tr>
</thead>
<tbody>
<tr>
<td>“Cloud platform has never been compromised”</td>
<td>Scoped to exclude hardware vulnerabilities, network exposures, contractor access, and access control abuse</td>
<td><a href="https://archive.is/oXy79">Flock blog</a></td>
</tr>
<tr>
<td>“No customer data accessed or exfiltrated”</td>
<td>“Customer data” contractually excludes raw footage—the same footage <a href="https://www.kcrg.com/2025/12/24/cedar-rapids-police-cameras-among-dozens-exposed-unrestricted-access/">publicly streamed from Cedar Rapids</a></td>
<td><a href="https://footnote4a.org/news/iowa-logs">Contract language</a></td>
</tr>
<tr>
<td>“Customers own and control their data”</td>
<td>Contract grants Flock “non-exclusive, royalty-free, irrevocable, worldwide license” to use customer data</td>
<td><a href="https://archive.is/hh9uE">Standard contract</a></td>
</tr>
<tr>
<td>“No centralized database”</td>
<td>Shared SaaS infrastructure; network-wide hot lists enable cross-jurisdictional queries</td>
<td><a href="https://footnote4a.org/news/network-size">Network analysis</a></td>
</tr>
<tr>
<td>“Registered vulnerabilities with MITRE”</td>
<td>Only 4 CVEs registered; 50+ findings in Gaines report unaddressed</td>
<td><a href="https://github.com/GainSec/anti-crime-ecosystem-research">Gaines report</a></td>
</tr>
<tr>
<td>“Worked with researcher throughout study”</td>
<td>Researcher confirms Flock has not confirmed remediation of any reported issues</td>
<td><a href="https://github.com/GainSec/anti-crime-ecosystem-research">Gaines report</a></td>
</tr>
<tr>
<td>Offshore contractors</td>
<td>Not mentioned</td>
<td><a href="https://www.wired.com/story/flock-uses-overseas-gig-workers-to-build-its-surveillance-ai/">Wired</a>, <a href="https://www.upwork.com/ent/portal/flocksafety/">Upwork portal</a></td>
</tr>
<tr>
<td>CJIS compliance</td>
<td>Not mentioned; devices lack required encryption</td>
<td><a href="https://github.com/GainSec/anti-crime-ecosystem-research">Gaines report</a></td>
</tr>
</tbody>
</table>
<ul>
<li>Flock’s “never been hacked” claim is scoped to exclude hardware, contractors, and access abuse</li>
<li>Security vulnerabilities reported in February 2025 remain unpatched as of November 2025</li>
<li>Offshore Upwork contractors review surveillance footage without disclosed vetting</li>
<li>CJIS-required encryption is absent from Flock devices</li>
<li>No evidence of a Flock data breach notification to Iowa agencies despite documented
vulnerabilities and foreign contractor access.</li>
</ul>
<h2>Flock Security Vulnerabilities: Still Unpatched a Year Later</h2>
<p>Flock writes that “the theoretical vulnerabilities described were highly technical and would have
required physical access.” It does not write that these “theoretical vulnerabilities” no longer exist.</p>
<p>The issues were reported to Flock in February 2025. In November 2025, they were confirmed to still exist.</p>
<p>Flock writes in the past tense, but gives no indication that use of this tense is warranted.</p>
<p>A typical “trust us, we’re fine” security blog post follows a predictable pattern, to the point
where I’m certain there is a <abbr class="md-tooltip" data-tooltip="Chief Information Security Officer">CISO</abbr>-central where you can download form letters:</p>
<ul>
<li>We were made aware of a vulnerability on [date].</li>
<li>We worked with researcher A to develop a fix that we rolled out [shortly after].</li>
<li>We carefully examined our logs and determined no data was compromised. (Alt: We determined that a
limited set of data may have been accessed. Affected customers were notified in a separate email).</li>
<li>No action is required. (Alt: We recommend that you take X action immediately. We have disabled Y
until you do).</li>
</ul>
<p>Instead, nine months after Jon Gaines “worked with Flock throughout the study” (according to Flock’s
blog post), <a href="https://github.com/GainSec/anti-crime-ecosystem-research">his report states</a>, “the vendor has not confirmed whether any of the reported
issues have been remediated or are planned for remediation.”</p>
<p>The only action Flock has taken is to downplay the severity and exaggerate the complexity for the
better part of a year.</p>
<h2>Flock’s CJIS Compliance Failures</h2>
<p>There are several (well… many) issues with Flock’s compliance issues, but the most straightforward
one is that <a href="https://github.com/GainSec/anti-crime-ecosystem-research">the vulnerabilities Flock discusses in this post</a> show that Flock devices are
not encrypted.</p>
<p>Encryption is a <a href="https://footnote4a.org/news/federal-insecurity">hard requirement for <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services (CJIS) Security Policy">CJISSECPOL</abbr></a>.</p>
<h2>Who Can Access Flock Safety License Plate Data?</h2>
<p>While its overseas workers may access the data for other reasons, Flock states in its blog post that
“Flock employees do not access customer data except in tightly controlled, audited circumstances for
support or maintenance.”</p>
<p>Critically, the company does not define what those “tightly controlled, audited circumstances”
look like, who validates those controls, or who performs the audits. We can only assume it’s Flock
doing all of this in secret.</p>
<p>However, in its <a href="https://archive.is/hh9uE">contract</a>, Flock defines circumstances other than “support or maintenance” where
its employees may access and disseminate information, including when Flock has a “good faith belief”
that doing so is necessary for <a href="https://footnote4a.org/news/trojan-contracts">basically any reason</a>.</p>
<h2>Flock Offshore Contractors, Background Checks, and Foreign Data Access</h2>
<p><a href="https://footnote4a.org/news/overseas-data">We know Flock images and audio are reviewed by foreign Upwork contractors</a>.
Flock has not publicly acknowledged or commented on that fact. Flock <a href="https://www.wired.com/story/flock-uses-overseas-gig-workers-to-build-its-surveillance-ai/">hid the evidence after Wired
and 404Media reached out for comment</a>.</p>
<p>As of January 6, 2026, Flock’s <a href="https://www.upwork.com/ent/portal/flocksafety/">Upwork Enterprise Portal</a> is still online.</p>
<p>After national media reported on these contractors who are reviewing images and audio files, Flock did
not respond at all.</p>
<p>It did not put out a statement that its foreign contractors undergo rigorous vetting or that the
data collected by <a href="https://footnote4a.org/news/network-size">250,000+ devices</a> is not available to foreign actors.</p>
<p>It is also unclear if Flock considers Upwork contractors on the other side of the globe to be
operating under “tightly controlled, audited circumstances.”</p>
<h2>Flock Data Retention and Deletion Questions</h2>
<p>Based on my experience, “what happens after the retention period?” question is an actual “Frequently
Asked Question.” To my knowledge, Flock has not answered it beyond “data is automatically deleted”
(generally passively voiced).</p>
<p>The process for deletions, and, equally importantly, the process for validating whether deletions
are complete and irreversible, remains a mystery to this day.</p>
<p>This is a critical question because the storage solution the company uses, <a href="https://docs.aws.amazon.com/AmazonS3/latest/userguide/DeletingObjects.html">AWS S3, offers
versioning and “soft deletes,”</a> a feature where a “deletion marker” is stored
alongside the actual file (possibly in low-cost archival storage).</p>
<p>This makes the file <em>appear</em> deleted to everyone, including the software, except S3-administrators
for whom restoring the file is a matter of either removing the marker, or copying the file while
ignoring the marker.</p>
<p>Of course, this is in addition to the contract granting Flock the “non-exclusive, royalty-free, irrevocable,
worldwide license to use the Customer Data,” for which Flock has not even begun answering the question.</p>
<h2>Flock Breach Notification: Iowa Case Study</h2>
<p>A public records request to the Iowa Department of Public Safety, which is responsible for
overseeing <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services (CJIS) Security Policy">CJISSECPOL</abbr>, indicates that neither Flock, nor any of its Iowa customers, made the
mandatory disclosures following <a href="https://github.com/GainSec/anti-crime-ecosystem-research">the February 2025 vulnerability findings</a>, or the findings
that <a href="https://footnote4a.org/news/overseas-data">overseas workers have access</a>.</p>
<p>It is likely no different in other jurisdictions.</p>
<h2>“Has Flock Been Hacked?” — What They’re Actually Saying</h2>
<p><a href="https://archive.is/oXy79">This article</a> was a trip. It comes on the heels of <a href="https://footnote4a.org/news/colwell-files">a December 8, 2025 mass
email</a> in which Flock’s Head Solutioneer, Chris Colwell, defensively states
that Flock has never been hacked and that the information published on “a third-party website [that]
began aggregating search information” was instead obtained via public record requests.</p>
<p>Maybe Colwell got the “Has Flock Been Hacked?” question via e-mail. Maybe he didn’t. Either
way, it’s oddly defensive posturing for a company whose CEO sends out mass emails saying it “adheres
to the highest security standards, including: NDAA, SOC2 (Type II), SOC3, ISO 27001, HECVAT, [and]
FERPA.”</p>
<p>Some of those aren’t even security standards, as I discussed in <a href="https://footnote4a.org/news/staunton-attack">a previous post</a>.</p>
<h3>How Flock Defines “Hacked” and “Breach”</h3>
<blockquote>
<p>Flock’s cloud infrastructure has never been compromised. There has never been an incident in which
customer data was accessed or exfiltrated by an attacker. This is not a matter of semantics or
technical spin; it reflects Flock’s actual security record since its inception.</p>
</blockquote>
<p>Immediately, Flock’s statements are limited to the “cloud platform.” This excludes:</p>
<ul>
<li><a href="https://github.com/GainSec/anti-crime-ecosystem-research">Hardware vulnerabilities</a></li>
<li><a href="https://www.404media.co/flock-exposed-its-ai-powered-cameras-to-the-internet-we-tracked-ourselves/">Network compromises</a>.</li>
<li><a href="https://www.9news.com/article/news/politics/atf-searches-ice-access-loveland-license-plate-tracking-cameras/73-f319ab3b-201d-42af-8dae-35870a63b94a">Data accessed through legitimate but abused access controls</a></li>
<li>Third-party <a href="https://footnote4a.org/news/dps-denmark">integrations</a> or <a href="https://footnote4a.org/news/overseas-data">contractors</a>.</li>
</ul>
<p>Industry standards consider a “breach” or a “compromise” to be any incident where an unauthorized
party has access, when data is disclosed without authorization, or when <a href="https://www.404media.co/ice-taps-into-nationwide-ai-enabled-camera-network-data-shows/">data control is lost</a>.
Flock’s definition is limited to “customer data was accessed or exfiltrated.”</p>
<p>This narrow definition of “hacking” excludes:</p>
<ul>
<li>Authorized access later deemed improper (rogue employee, abusive search).</li>
<li>Data shared under coerced or misunderstood “consent.”</li>
<li>Access by contractors they failed to disclose.</li>
<li>Exploitation of legitimate credentials.</li>
</ul>
<h3>Flock’s “Customer Data” Definition Excludes Footage</h3>
<p>“Customer data” appears to be an attempt at contractual finagling. If you’ve watched <a href="https://www.youtube.com/watch?v=vU1-uiUlHTo">Benn Jordan’s
video</a> you know that Benn was able to view a live feed of actual cameras being used to support
real-life operations.</p>
<p>This is the current definition of “customer data”:</p>
<blockquote>
<p>“Customer Data” means the images, audio and/or video segments made available to Customer through
the Web Interface in connection with the Flock Services, together with the metadata … For
clarity, Customer Data does not include the underlying raw Footage captured by the Flock Hardware</p>
</blockquote>
<p>By that definition, unauthorized persons downloading footage is not a “breach” or “access to customer
data” because “customer data” does not include footage.</p>
<p>There was still a <a href="https://www.kcrg.com/2025/12/24/cedar-rapids-police-cameras-among-dozens-exposed-unrestricted-access/">public Internet livestream of a man being hauled off in an ambulance</a>.</p>
<p>Shortly before Flock aired that livestream, Cedar Rapids indicated to <a href="https://footnote4a.org/news/iowa-logs">the ACLU of Iowa and
University of Iowa researchers</a> that its Flock contract has different language:</p>
<blockquote>
<p>“Customer Data” means the data, media, and content provided by Customer through the Services. For
the avoidance of doubt, the Customer Data will include the Footage.</p>
</blockquote>
<p>Under Flock’s definition, the public exposure of a man being loaded into an ambulance was not a
“breach” because raw footage isn’t “customer data.” Under Cedar Rapids’s contract, it was. Flock
gets to claim a clean security record by choosing which definition applies after the fact.</p>
<p>Flock further muddies the waters in its blog post when it writes “Every Flock customer, whether a
city, county, law enforcement agency, neighborhood, school, or business, retains full ownership and
control of the data collected on their behalf.”</p>
<p>These statements can’t all be true at the same time. It doesn’t matter to Flock because Google’s AI
won’t pick up on it. Poisoning the <abbr class="md-tooltip" data-tooltip="Search Engine Optimization">SEO</abbr>-well with corporate disinformation is a business decision.</p>
<h3>Flock Data Types: Strategic Obfuscation</h3>
<blockquote>
<p>Flock does not maintain a centralized database of license plate reader data across customers. We
do not sell or monetize vehicle data, and we do not share customer data without the customer’s
explicit authorization.</p>
</blockquote>
<p>In two sentences, no fewer than three types of data are introduced:</p>
<ul>
<li>License plate reader data</li>
<li>Vehicle data</li>
<li>Customer data</li>
</ul>
<p>To know whether the statement could potentially be true requires knowing the definitions of these
terms.</p>
<p>“We do not sell or monetize vehicle data” or “Flock does not maintain a centralized database of
license plate reader data across customers” <a href="https://footnote4a.org/news/network-size">certainly do not sound true</a>, but
there is undoubtedly a reason why the company chose to distinguish between “license plate reader
data,” “vehicle data,” and “customer data” all in one paragraph. And it’s not “for clarity.”</p>
<p>Perhaps the most baffling statement in the whole post is this one:</p>
<blockquote>
<p>LPRs do not capture point-in-time images of vehicles on public roadways</p>
</blockquote>
<p>I’m sure this too depends on some obscure, unspecified definition of “point-in-time image.” Maybe it
means that you can’t tell the Flock system “find me a picture of a car with plate 739APD at 10:45am
last Saturday” because you can only tell it “give me a 30-day location history for plate 739APD.”</p>
<p>Who knows. Even ardent Flock-fans can see that this statement is, at best, grossly misleading.</p>
<p>The important thing is that Flock asked itself “Has Flock Been Hacked?” and then proceeded to dodge
the question as though it were participating in a Senate confirmation hearing rather than writing
corporate fluff on its own blog.</p>
<h2>What Flock Safety Should Disclose</h2>
<p>First, <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services (CJIS) Security Policy">CJISSECPOL</abbr> requires compliance documentation to be submitted to the state’s <abbr class="md-tooltip" data-tooltip="CJIS Systems Agency">CSA</abbr> and the FBI.
For security vulnerabilities, this includes mitigation plans and/or compensatory controls. This
mandatory compliance documentation is public record. Disclose it.</p>
<p>Second, some security vulnerabilities require additional disclosure. The complete lack of encryption,
for example, is fundamentally incompatible with <abbr class="md-tooltip" data-tooltip="Criminal Justice Information Services (CJIS) Security Policy">CJISSECPOL</abbr>, which requires using a NIST-validated
encryption module. Name the modules.</p>
<p>Prove, or better yet, have an independent third party audit, AWS S3 configurations to confirm that
buckets are unversioned, and there are no “soft deletes.”</p>
<p>Release the CVE numbers. Flock claims it “registered relevant vulnerabilities with the National
Vulnerability CVE database via MITRE.” If true, those identifiers are public. Name them. If this set
is limited to the four issues previously registered, then Flock’s position is that the remaining 50+
findings in Jon Gaines’ report are not “relevant.” This is a concerning attitude when it comes to security.</p>
<p>Disclosing public compliance records and confirming which vulnerabilities have been patched, by
tracking them in a public vulnerability database or otherwise, does a lot more than writing an
<abbr class="md-tooltip" data-tooltip="Search Engine Optimization">SEO</abbr>-optimized blog post that relies purely on semantics and technical spin to say nothing of value.</p>
<p>Relying on security through obscurity <a href="https://cwe.mitre.org/data/definitions/656.html">is its own documented security vulnerability</a>.</p>
<p>Relying on security through denial is even worse.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>It is a rare occurrence where I accuse Flock of transparency. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[The 250,000+ Camera "City-Wide" Network]]></title>
            <link>https://footnote4a.org/news/network-size</link>
            <guid isPermaLink="false">https://footnote4a.org/news/network-size</guid>
            <pubDate>Sun, 04 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[A bug in Flock's system swept 257,806 cameras into an "ICE detainer" search. Flock claims no data was accessed—but California, Illinois, and Virginia prohibit such searches regardless.]]></description>
            <content:encoded><![CDATA[<p>As Flock <a href="https://footnote4a.org/news/burden-of-compliance">continues to battle transparency</a> and
<a href="https://footnote4a.org/news/secret-searches-part2">expunge the public record</a>, the logs—reduced as they may be—continue
to yield insights into the privately-owned and -operated Surveillance-as-a-Service network. The
latest: a drug task force out of Brookfield, Missouri (pop. ~4,000)
<a href="https://footnote4a.org/search?q=%22ice+detainer%22">retrieved a vehicle’s location history</a> and accidentally exposed the
scale of the Flock network—and, potentially, violated the laws of several states in the process.</p>
<div class="float-right ml-4 mt-4 inline-flex align-middle flex-col">
<div class="grid grid-cols-2 space-x-4 items-center">
  <img class="mb-1 w-70" src="https://footnote4a.org/blog/network-size/5000.png" alt="Flock homepage claims 5,000+ agencies">
  <img class="border rounded-lg mb-1 w-70" src="https://footnote4a.org/blog/network-size/networks.png" alt="Flock homepage claims 5,000+ agencies">
  </div>
  <p class="text-center text-muted text-xs mt-1">
  flocksafety.com homepage touting 5,000+ and "networks searched" showing 6,385
  </p>
</div>
<p>On its website’s main landing page, Flock claims it is “Trusted by 5,000+ law enforcement agencies.”
That number roughly lines up with the 5,730 agencies seen in search logs, and the ~6,400 “networks
searched” we see in network audit logs.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>Brookfield’s “ICE detainer” search, however, reveals a much bigger number: 25,263.</p>
<p>This search was logged twice, once at 04:10:13, and once at 04:10:31:<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<ul>
<li><strong>Name:</strong> “REDACTED”</li>
<li><strong>Organization:</strong> “North MO DTF Brookfield MO PD”</li>
<li><strong>Networks Searched:</strong> 25,263</li>
<li><strong>Devices Searched:</strong> “257,806”</li>
<li><strong>Time Frame:</strong> 10/30/2025, 10:06:10 PM UTC to 10/31/2025, 04:06:10 AM UTC</li>
<li><strong>License Plate:</strong> “REDACTED”</li>
<li><strong>Reason:</strong> “ICE detainer”</li>
<li><strong>Case #:</strong> “643”</li>
<li><strong>Filters:</strong> “REDACTED”</li>
<li><strong>Search Time:</strong> 10/31/2025, 04:10:13 AM UTC</li>
<li><strong>Type:</strong> “lookup”</li>
<li><strong>Text Prompt:</strong> <em>None</em></li>
<li><strong>Moderation:</strong> An issue was identified that caused the system to initiate unprocessed search
activity on a larger set of cameras than intended by the user. No footage or data from these
devices was accessed or viewed. The underlying bug has been fixed, and additional safeguards have
been implemented to prevent recurrence.</li>
</ul>
<p>The <em>moderation</em> field, which generally contains only the word <code>allow</code>, and is assumed to be the
outcome of Flock’s AI moderator checking for problematic searches, appears to contain a manually
entered case note instead.<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup></p>
<p>The critical phrase is: <strong>“No footage or data from these devices was accessed or viewed.”</strong></p>
<p>This implies that the 257,806 devices across 25,263 networks weren’t supposed to be <em>searched</em>, but
they actually do <em>exist</em> and have search and view capabilities.</p>
<p>This is both interesting and problematic. It is interesting because the size of Flock’s network is
the subject of some speculation. We can draw inferences from “total devices/networks searched,” but
we don’t know what individual agencies searched, or can access.</p>
<p>There are agencies that contractually have no restrictions on which Flock networks or cameras they
access, but these agencies don’t appear to conduct searches of significantly more networks or
devices than others. It’s possible that, in those cases, Flock only grants access to a subset of its
cameras, despite the terms.</p>
<p>@<a href="https://footnote4a.org/blog/network-size/joco.pdf" class="collapsible">Johnson County, IA MoU (unrestricted access)</a></p>
<div class="text-sm text-muted mb-4">
(<a href="https://footnote4a.org/pd/6730-johnson-county-ia-so/audit">Johnson County IA SO</a> & <a href="https://footnote4a.org/pd/8129-johnson-county-ia-so-inactive">Johnson County IA (inactive)</a> logs)
</div>
<p>Of course, the company treats audit logs—marketed as building community trust through transparency—
in much the same way as the CIA treats its “South America” Rolodex.</p>
<p>Still, knowing the background, we can continue <a href="https://footnote4a.org/news/flock-infer">inferring</a> based on these new log
entries showing 257,806 devices and 25,263 networks. The (plausible) facts:</p>
<ol>
<li>More than a quarter million Flock “devices” exist on Flock’s network.</li>
<li>Because this was a search for a plate, and the note mentions “footage” and “viewing,” all 257,806
“devices” are likely cameras (Falcon, Condor, Wing, etc.).</li>
<li>There are fewer than 25,263 agencies in the country;<sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup> the ~5,000–6,000 Flock-using
agencies is well-supported.</li>
<li>Even if the majority of ~6,000 agencies would have multiple networks, it would not come close to
the 25,263 number.</li>
</ol>
<p>The only reasonable conclusion, based on the available information, is that <strong>the 25,263 number
includes Flock’s retail customers</strong>, like Lowe’s, Academy Sports, and FedEx.</p>
<p>But there’s another implication: California, Illinois, and Virginia have enacted laws restricting
immigration-related searches of their ALPR data. If Flock’s bug exposed cameras in those states to
an “ICE detainer” search—even if, as the company claims, “no footage or data was accessed or
viewed”—that’s a potential violation of state law that Flock has disclosed to no one except through
a log entry nobody was meant to read.</p>
<p>The fact that these 257,806 devices are collecting <a href="https://www.nbcnews.com/tech/tech-news/flock-police-cameras-scan-billions-month-sparking-protests-rcna230037">over twenty billion plate scans every
month</a> is interesting and terrifying in itself, but not a complete shock.</p>
<p>What is more shocking is that once again, Flock’s poor security practices are revealed.</p>
<p>Even assuming the implausible note is true, and these (presumed) retail devices were not searched,
the capability is clearly there.</p>
<p>That means Flock’s access control is done through various vendor-managed flags and roles, rather
than through secure measures like encryption.</p>
<p>When a retailer or government believes it is sharing “<a href="https://footnote4a.org/news/trojan-contracts">its data</a>” with local
police, rather than having Flock register a secure password or encryption key for the local agency,
it’s a permission checkbox: “go ahead and disclose it, Flock.”</p>
<p>That is not control, and it’s not security.<sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup> It’s trusting a vendor that has shown it can’t be
trusted. It leaves the door wide open to unauthorized access, uncontrolled dissemination, and
software bugs.</p>
<p>In all likelihood, Flock did not proactively disclose this incident or the details of its
investigation and remediation steps.<sup class="footnote-ref"><a href="#footnote6">[6]</a><a class="footnote-anchor" id="footnote-ref6"></a></sup> Instead, it chose to edit the “immutable” logs and
updated the “moderation” field. The logs don’t indicate the (supposedly) intended search scope, nor
is there any way to verify if any other edits were made.</p>
<p>Flock’s customers—whether private retailers or California cops—simply have no way of knowing if this
search touched or disclosed data from “their” networks.</p>
<p>All we have is a statement hidden in a log file that nobody reads, in a field not intended for it,
where the company assures us, without providing evidence, that multiple states’ prohibitions on
immigration-related searches were not violated through this search.</p>
<p>What’s more, Flock, a single private corporation, now operates a camera for every 1,000 American
adults.</p>
<p>The company wants there to be many more, all built on the same fundamentally flawed security
framework: “trust Flock.”</p>
<p>This search demonstrates—again—why we can’t allow that.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Some customers appear to have multiple networks, separated by product type (e.g. one network for
“Falcon” and one network for “Raven” <a href="https://footnote4a.org/news/overseas-data">voice detectors</a>). <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>These times differ fairly significantly from the search window time of 04:06:26. This could
indicate the user was slow to complete the search form, or may indicate system issues. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>Again demonstrating the mutability of audit logs. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>17,541 in 2018, according to the
<a href="https://bjs.ojp.gov/library/publications/census-state-and-local-law-enforcement-agencies-2018-statistical-tables">Bureau of Labor Statistics</a> <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>It’s also expressly prohibited by CJISSECPOL. <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote6" class="footnote-item"><p>If it did, the disclosure should be available via open records request from any Flock-using
agency. If you have information that Flock took proactive steps,
<a href="mailto:hcvp@haveibeenflocked.com">reach out</a>. <a href="#footnote-ref6" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock and Cyble: Aligned Values (Part IV)]]></title>
            <link>https://footnote4a.org/news/cyble-part4</link>
            <guid isPermaLink="false">https://footnote4a.org/news/cyble-part4</guid>
            <pubDate>Wed, 31 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Y Combinator funds both surveillance infrastructure and the machinery to silence its critics.]]></description>
            <content:encoded><![CDATA[<div class="markdown-alert markdown-alert-note">
<p class="markdown-alert-title">Note</p>
<p>This article was updated on January 17, 2026 to include the <abbr class="md-tooltip" data-tooltip="Regional Organized Crime Information Center (&quot;Serving Alabama, Arkansas, Florida, Georgia, Kentucky, Louisiana, Mississippi, North Carolina, Oklahoma, South Carolina, Tennessee, Texas, Virginia and West Virginia, as well as Puerto Rico and the U.S. Virgin Islands.&quot;)">ROCIC</abbr>/FBI emails in the timeline.
See <a href="https://footnote4a.org/news/fbi-investigation">this article</a> for more detail.</p>
</div>
<p>Yesterday, I received a Flock customer email blast where
<a href="https://footnote4a.org/news/colwell-files">the company recommends leaving the nationwide network</a> to evade transparency.
It was sent out by Chris Colwell, Flock’s Vice-President of “Solutions Engineering”<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup>. Colwell
assures his police customers that “Flock has not been breached or compromised” and that the data
published on this site is “agency-released public-records data.”</p>
<p>That’s the version for Flock’s customers.</p>
<p>Behind the scenes, Flock and Cyble—companies birthed from the same Atlanta-area Y Combinator
network—are weaponizing opposing claims to silence a critic.</p>
<p>I wasn’t going to spend more time on Flock’s internal contradictions, but the sheer coordination of
this effort deserves a spotlight. It’s important that people know the type of company that local
elected officials are choosing to do business with, and that police are choosing to trust.</p>
<p>Flock knows they are on thin ice. If they filed meritless abuse notices themselves, they would be
wide open to a claim of tortious interference with a contract. A court case would open them up to
discovery—an expensive process where Flock’s internal communications would become public.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<p>So they use fellow Y Combinator company Cyble to do their dirty work. Send notices to take down a
critical website. Censorship-laundering. Of course, that can only really work if you keep your
plausible deniability plausible.</p>
<p>Flock being Flock … well, let’s go through it.</p>
<h2>The Timeline</h2>
<ul>
<li><strong>December 8</strong>: Flock sends out a mass email: “Flock has not been breached or compromised.” and
“websites like the one circulating online are using agency-released public-records data.”</li>
<li><strong>December 8</strong>: I receive a “Forgotten email notification” for the Cloudflare account.<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup></li>
<li><strong>Before December 10, 2025</strong>: Houston <abbr class="md-tooltip" data-tooltip="High Intensity Drug Trafficking Area">HIDTA</abbr> sends out a “Situational Awareness Bulletin” about
<a href="http://haveibeenflocked.com">haveibeenflocked.com</a>.</li>
<li><strong>December 10, 2025</strong>: <abbr class="md-tooltip" data-tooltip="Regional Organized Crime Information Center (&quot;Serving Alabama, Arkansas, Florida, Georgia, Kentucky, Louisiana, Mississippi, North Carolina, Oklahoma, South Carolina, Tennessee, Texas, Virginia and West Virginia, as well as Puerto Rico and the U.S. Virgin Islands.&quot;)">ROCIC</abbr><sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup> forwards the Houston bulletin to its coordinators.</li>
<li><strong>December 11</strong>: The FBI sends out an email to agencies stating “Flock has committed toremoving
officer usernames from future audits.”</li>
<li><strong>December 12</strong>: I receive an email: “Cloudflare has received information that the following URL
violates Cloudflare’s Developer Platform Terms of Service, which prohibit content that discloses
sensitive personal information”</li>
<li><strong>December 16</strong>: Cloudflare slaps a “phishing interstitial” on the site and forwards a report
submitted by Thomas Siah, of Cyble:</li>
</ul>
<blockquote>
<p>Logs or other evidence of abuse: The mentioned website is wrongfully using our client’s registered
trademark in the fake web page. The use of the Client’s registered trademark descriptively in the
reported URL in order to disguise or phish the general public has not been authorized by our
client.</p>
</blockquote>
<ul>
<li>
<p><strong>December 19</strong>: Siah sends a report to Hetzner claiming: “The website publicly and deliberately
releases extensive, sensitive information obtained from Flock” and “Additionally, the website may
be used to phish the general public on the name of Flock Safety which is a serious concern to
notify you.”<sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup></p>
</li>
<li>
<p><strong>December 29</strong>: Siah “supplements” the complaint by claiming “the website publicly and
deliberately discloses extensive, sensitive information obtained from Flock and its automated
license plate reader (ALPR) systems with the apparent intent to undermine law enforcement
operations.”</p>
</li>
</ul>
<h2>Thomas Siah: The Real Agentic?</h2>
<div class="grid grid-cols-2 w-full gap-6">
    <img src="https://footnote4a.org/blog/cyble-part4/intel.png" alt="Cyble Vision" class="block">
    <img src="https://footnote4a.org/blog/cyble-part4/blaze-it.png" alt="Blaze AI" class="block">
</div>
<p>Cyble’s core offering and flagship product revolve around autonomous <s>brand rep</s>cybersecurity
threat enforcement by using agentic AI to send takedown notices.</p>
<p>This works for Cyble, because, in 2022, the company “<a href="https://www.prnewswire.com/news-releases/cyble-enters-into-a-threat-intelligence-contributor-partnership-with-virustotal-301586526.html">Enter[ed] into a Threat Intelligence
Contributor Partnership with VirusTotal</a>” — meaning Google-owned VirusTotal will consider
reports from Cyble’s platform credible.</p>
<p>The fact that no automated notices appear to have been submitted and VirusTotal comes back clean for
<a href="http://haveibeenflocked.com">haveibeenflocked.com</a> means that “Cyble Vision” or “Blaze AI” or whatever other label they slapped on
ChatGPT did not flag the website and did not send an automated report.</p>
<p>But Flock didn’t go to the Cyble website and hit “checkout” to be assigned an AI bot and (probably)
an agent in Bengaluru being paid starvation-wages.<sup class="footnote-ref"><a href="#footnote6">[6]</a><a class="footnote-anchor" id="footnote-ref6"></a></sup> The person who filed the complaints
with Cloudflare and Hetzner, <a href="https://theorg.com/org/cyble/org-chart/thomas-siah">Thomas Siah</a>, was recently promoted(?) from being Cyble’s “Head
of Business Development, APAC,” to being its “Vice-President of Partner Success.”</p>
<p>If Cyble’s AI is as “agentic” as their marketing claims, why did a Vice President have to manually
file a report? Either the AI knows I’m not a threat, or the AI is a façade for manual censorship.</p>
<p>Whichever of these may be true, Cyble’s Singapore-based VP of Partner Success—and former Head of
Business Development for the Asia-Pacific region—Thomas Siah, has no business handling low-level
complaints for Flock.</p>
<p>Cyble is not a small company. It has offices and employees on multiple continents, and, according to
a quick search, has raised north of $40M in funding. And it’s no secret that “AI” companies often
use cheap offshore labor (<a href="https://footnote4a.org/news/overseas-data">Flock uses contractors for its AI detection</a>).
Cyble, very likely, is not the exception to this faux-rule.</p>
<p>But Siah is not cheap offshore labor. He is a high-level executive with a company that likely
carries a nine-figure valuation. It makes no sense for someone at the senior executive level in
Singapore to involve himself in managing a complaint against a website with a $10 hosting bill.</p>
<p>Unless that high-level executive coincidentally(?) graduated from the same Business Systems program
at Monash University in Melbourne, Australia, as Eric Tan, Flock’s former CIO.<sup class="footnote-ref"><a href="#footnote7">[7]</a><a class="footnote-anchor" id="footnote-ref7"></a></sup></p>
<p>Or unless the high-level executive works for another Y Combinator-backed company. And that company,
despite its main office being in Cupertino and its incorporation in Delaware, has its formal
headquarters in Alpharetta, next door to Flock. At an address registered to Cyble’s co-founder and
current COO Manish Chachada, who lists 25 years of “Full-time Senior Finance Executive” experience
in the Atlanta area on his public LinkedIn page.</p>
<p>It probably also helps for the executive filing the complaint to be in Singapore, outside the reach
of American courts.<sup class="footnote-ref"><a href="#footnote8">[8]</a><a class="footnote-anchor" id="footnote-ref8"></a></sup></p>
<h3>Y Combinator, Reddit, and Speaking Out</h3>
<p>This network of Y Combinator alumni—the tight-knit network both Flock and Cyble are part of—talks
about “aligned values” while it funds the surveillance infrastructure and the machinery to silence
its critics.</p>
<p><a href="https://x.com/garrytan/status/1856932483864170606">Flock’s first investors</a> were Y Combinator’s President and CEO Garry Tan, and Reddit
co-founder Alexis Ohanian. This led to Flock CEO Garrett Langley <a href="https://archive.is/Oh6TM">interviewing Ohanian for Flock’s
blog</a>.<sup class="footnote-ref"><a href="#footnote9">[9]</a><a class="footnote-anchor" id="footnote-ref9"></a></sup></p>
<p>In the interview, Langley starts a question with “One thing that Y Combinator pushes is the
relationship between co-founders.” YC partner Ohanian responds to that sentiment by doubling down:
“Where we align is where I really push founders to make sure they are aligned—on their values.”</p>
<p>Flock’s and Cyble’s values are aligned.</p>
<p>Stickied to the top of Alexis Ohanian’s <a href="https://www.reddit.com/user/kn0thing/">Reddit profile</a> is “<a href="https://www.reddit.com/r/blog/comments/5r43td/an_open_letter_to_the_reddit_community/">An Open Letter to
the Reddit Community</a>,” which railed against <a href="https://www.federalregister.gov/documents/2017/02/01/2017-02281/protecting-the-nation-from-foreign-terrorist-entry-into-the-united-states">Donald Trump’s January 2017 executive
order</a> directing DHS, the FBI, and intelligence agencies to implement:</p>
<blockquote>
<p>a process to evaluate the [visa] applicant’s likelihood of becoming a positively contributing
member of society and the applicant’s ability to make contributions to the national interest; and
a mechanism to assess whether or not the applicant has the intent to commit criminal or terrorist
acts. — <a href="https://www.federalregister.gov/documents/2017/02/01/2017-02281/protecting-the-nation-from-foreign-terrorist-entry-into-the-united-states">EO 13769</a>, “Protecting the Nation From Foreign Terrorist Entry Into the United
States”, January 27, 2017</p>
</blockquote>
<p>Ohanian strongly—and rightly—condemned the order, calling it “deeply un-American.”</p>
<p>Six months later, either not connecting dots or ignoring them, he first invested in Flock.</p>
<div class="grid grid-cols-2 gap-x-6 items-center">
    <img src="https://footnote4a.org/blog/cyble-part4/ohanian.png" alt="Photo of Langley and Ohanian at Flock">
    <img src="https://footnote4a.org/blog/cyble-part4/reddit.png" alt="Reddit post about Flock being used by ICE">
    <p class="text-xs block col-span-2 text-center mx-15">
        "Where we align is where I really push founders to make sure they are aligned—on their values.
        Specifically, complementary values and how founders work together."
        <br>
        <span class="text-xs block col-span-2 text-right">
            &mdash; Alexis Ohanian, Reddit Co-Founder and Flock investor, July 2, 2019
        </span>
    </p>
</div>
<p>Two years later, he told Garrett Langley “I have a Flock camera outside my home … I had the search
on vehicle color and it was able to pull up every white car that had passed by my camera.” Shortly
after that interview, his company contributed to another Flock funding round, alongside defense
investors Bedrock and Peter Thiel’s Founders Fund.</p>
<p>He then founded <a href="https://sevensevensix.com/">Seven Seven Six</a> and invested in Flock again—this time,
joined by Andreessen Horowitz.</p>
<p>His 2017 pro-immigrant, anti-authoritarian post is still stickied to his Reddit profile:</p>
<blockquote>
<p>Right now, Lady Liberty’s lamp is dimming, which is why it’s more important than ever that we
speak out and show up to support all those for whom it shines—past, present, and future. I ask you
to do this however you see fit, whether it’s calling your representative (this works, it’s how we
defeated SOPA + PIPA), marching in protest, donating to the ACLU, or voting, of course, and not
just for Presidential elections. — <a href="https://www.reddit.com/r/blog/comments/5r43td/an_open_letter_to_the_reddit_community/">/u/kn0thing</a>, An Open Letter to the Reddit
Community, January 30, 2017</p>
</blockquote>
<p>I am an immigrant speaking out against surveillance technology and the company deploying it.</p>
<p>A company that directly implements the 2017 executive order by using “<a href="https://www.aclu-wy.org/news/surveillance-company-flock-now-using-ai-report-us-police-if-it-thinks-our-movement-patterns-are/">predictive
intelligence</a>” to find “<a href="https://abc7news.com/post/border-patrol-is-monitoring-us-drivers-detaining-suspicious-travel-patterns/18180071/">suspicious travel patterns</a>” to find if anyone — not just
immigrants — “has the intent to commit criminal or terrorist acts.”</p>
<p>A deeply un-American company, whose only “aligned value” is profit.</p>
<p>We donated to the ACLU because we knew they would call this what it is: “<a href="https://www.aclu.org/news/privacy-technology/flock-roundup">authoritarian tracking
infrastructure</a>.”</p>
<p>We protested SOPA and PIPA because we knew large corporations send bullshit notices about trademarks
and phishing to shut down their critics.</p>
<p>Meanwhile, Flock has been using its investment money to <a href="https://therecord.media/flock-surveillance-technology-gunshot-voice-detection">detect human voices</a>, <a href="https://techcrunch.com/2025/01/08/flock-safety-quietly-hired-a-sitting-california-mayor-now-hes-suing-flock/">hire sitting
mayors</a>, <a href="https://footnote4a.org/news/reid">develop person-tracking</a>, and
<a href="https://footnote4a.org/news/cyble-downtime">pay Thomas Siah to shut down websites</a> … <a href="https://www.theguardian.com/us-news/2025/oct/04/ice-chicago-extreme-force-protesters-journalists">for officer safety</a>.</p>
<p>Lady Liberty’s lamp isn’t dimming—it’s being used to read your plates.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>A title that sounds impressive but obfuscates his actual role. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>Their lawyers are also probably busy drafting a motion to intervene in <a href="https://www.courthousenews.com/san-francisco-man-sues-city-police-department-over-flock-camera-surveillance/">Michael Moore v.
SFPD</a>, the class action lawsuit filed in the N.D. of San Francisco last Sunday. The
Plaintiff’s attorney is Ramzi Abadou, who, according to his <a href="https://www.law.berkeley.edu/our-faculty/faculty-profiles/ramzi-abadou/">profile at Berkeley Law</a>, “has
been responsible for securing securities class action fraud recoveries exceeding $1.5 billion.”
These are about to be interesting times for Flock. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>Related to Flock? Who knows. The notification arriving shortly after an email blast sent out to
a bunch of cops raises questions in my mind. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p><abbr class="md-tooltip" data-tooltip="Regional Organized Crime Information Center (&quot;Serving Alabama, Arkansas, Florida, Georgia, Kentucky, Louisiana, Mississippi, North Carolina, Oklahoma, South Carolina, Tennessee, Texas, Virginia and West Virginia, as well as Puerto Rico and the U.S. Virgin Islands.&quot;)">ROCIC</abbr> is one of the <abbr class="md-tooltip" data-tooltip="Regional Information Sharing">RISS</abbr>—the <a href="https://footnote4a.org/news/riss-shell-game">federally funded, private corporations police use to
backdoor surveillance sidestep oversight</a>. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>This is the one where Siah used <a href="https://footnote4a.org/news/cyble-part3">pirated software</a> from a German “brand
reputation” company GlobalEyez to submit
<a href="https://footnote4a.org/blog/cyble-part3/globaleyez.jpg">a screenshot proving … input validation(?)</a> <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote6" class="footnote-item"><p>I have yet to see confirmation that Flock is a Cyble customer. Given the nature of both
companies, I would expect one of them to do a press release announcing a “strategic
partnership.” The attachment Siah hinted at in <a href="https://footnote4a.org/news/cyble-part3">Part III</a> sounds like it
might show that Flock <em>is</em> a customer—I will update if Hetzner forwards it. <a href="#footnote-ref6" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote7" class="footnote-item"><p>Tan left the company in September 2025. <a href="#footnote-ref7" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote8" class="footnote-item"><p>That said, I question the wisdom of putting the words “govt agencies” and “kindly suspend the
services” so close together. It’s a good thing I’m not a contract lawyer and don’t know latin. <a href="#footnote-ref8" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote9" class="footnote-item"><p>initialized would contribute to Flock’s $47M Series C funding round a few months later. <a href="#footnote-ref9" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock and Cyble Inc. Pile on the Allegations with no Evidence in Sight (Part III)]]></title>
            <link>https://footnote4a.org/news/cyble-part3</link>
            <guid isPermaLink="false">https://footnote4a.org/news/cyble-part3</guid>
            <pubDate>Mon, 29 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[The third installment in this series on when a government contractor pays a company for "Takedown Services" to prevent transparency in government]]></description>
            <content:encoded><![CDATA[<p>If you missed <a href="https://footnote4a.org/news/cyble-downtime">Part I</a> involving Cloudflare (who, to date, have not
responded), or <a href="https://footnote4a.org/news/cyble-part2">Part II</a>, in which Cyble and Flock accuse me of phishing and
trademark infringement, you may want to read those parts first.</p>
<p>This morning, Cyble sent a follow-up notice to Hetzner, the German cloud provider currently hosting
this website. In it, they claim that this “website poses an immediate threat to public safety and
exposes law enforcement officers to danger, in clear violation of our client’s users’ rights and its
intellectual property rights.”</p>
<p>Cyble does not offer any evidence, nor any details regarding Flock’s apparently exclusive
intellectual property right on posing a threat to public safety.</p>
<h2>Part 2.5: Oops, I missed a part</h2>
<p><em>(Edit: December 29, 3:45 pm, Cornfield Standard Time)</em>: Apparently, I missed an attachment that was
sent along with <a href="https://footnote4a.org/news/cyble-part2">the first statement to Hetzner</a>. In the interest of fair
reporting, I decided to edit this post and include it here rather than burying it in an old post. I
want to be sure I provide an accurate view of the weight of the evidence presented by Flock, via
Cyble:</p>
<p><img src="https://footnote4a.org/blog/cyble-part3/globaleyez.jpg" alt="GlobalEyez Screenseal"></p>
<p>Don’t attempt to adjust your screen — they did, in fact, send it as a JPEG. The QR code contains the
text <code>https://haveibeenflocked.com/</code>.</p>
<p>The screenshot appears to show most of this website’s IP-address in the frontpage input box, with a
message saying it’s not a valid license plate.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> I have no idea why.</p>
<p>The text in the screenshot is a little hard to read because of the watermarking, but if you zoom in,
you’ll see the following notice:</p>
<p><img src="https://footnote4a.org/blog/cyble-part3/commercial.png" alt="&quot;Not for commercial use&quot;"></p>
<p><a href="https://www.globaleyez.net/en/">GlobalEyez</a> appears to be a Cologne-based “brand protection”
company that charges $20 for the “Screenseal” tool used here.</p>
<p>It’s a tool that certifies the integrity and authenticity of screenshots. You know, to be able to
prove in court that images are genuine; a higher standard than Flock applies to its own ALPR images.</p>
<p>It looks like that $20 was simply too much for Cyble (<a href="https://www.crunchbase.com/organization/cyble">$44.8M raised</a>) or a16z-backed
Flock (<a href="https://www.crunchbase.com/organization/flock-safety">$655.6M raised</a>) to bear. They pirated software to file a complaint about
intellectual property infringement.</p>
<h2>Part III: Cyble’s Second Attempt</h2>
<p>What follows is Cyble’s full second statement, as well as my response.</p>
<p>Hetzner’s email:</p>
<blockquote>
<p>Dear Mr van Pelt,</p>
<p>We have received an abuse report for your IP address 5.78.142.181.</p>
<p>This is the complainant’s answer:</p>
<hr>
<p>We are writing to update you on our complaint regarding this website, which presents a significant
security risk to our client and its users. The website poses an immediate threat to public safety
and exposes law enforcement officers to danger, in clear violation of our client’s users’ rights
and its intellectual property rights.</p>
<p>The website publicly and deliberately discloses extensive, sensitive information obtained from
Flock and its automated license plate reader (ALPR) systems with the apparent intent to undermine
law enforcement operations. It hosts three searchable databases that expose critical operational
intelligence. Such disclosure of sensitive data substantially heightens the risk to officers and
the public and necessitates urgent remedial action.</p>
<p>Please be informed that our client is a renowned company in US and directly works with govt
agencies.</p>
<p>Attached is the letter from our Client in support of the complaint for your reference.</p>
<p>In view of the above, kindly suspend the services and stop the hosting of the website at the
earliest convenience.</p>
<hr>
<p>We will need a reply from you within the next <em>24 hours</em>.</p>
</blockquote>
<h2>Response</h2>
<blockquote>
<p>Dear Hetzner,</p>
<p>The complainant’s latest response significantly shifts his allegations, effectively abandoning the
original claims of “phishing” and “trademark infringement.” He has now pivoted to vague,
unsubstantiated accusations regarding “public safety” and “intellectual property.”</p>
<p>The complainant refers to a “letter from our Client in support of the complaint for your
reference.” This letter was not included in the notice sent to me. I cannot respond to claims I
have not seen, and I request that Hetzner forward this document immediately if it is being used to
evaluate this complaint.</p>
<p>The complainant mischaracterizes the data on my website. These are not “sensitive information
obtained from Flock”; they are public records released by government agencies under state public
records laws. These records document the use of surveillance technology by public tax-funded
entities. The publication of such records is a protected journalistic activity.</p>
<p>As Mr. Siah points out, his alleged client “directly works with govt agencies.” Had any of these
agencies believed they were endangered by my speech, or that I am engaged in any criminal act such
as interfering with law enforcement operations, they would surely have knocked on my door.</p>
<p>Instead, Mr. Siah—who is not, to my knowledge, an attorney—asks you to accept an informal
complaint on behalf of his employer (Cyble), on behalf of their client (Flock), on behalf of an
unnamed agency allegedly “in danger” from information he has not identified, on a website he has
not meaningfully described. This is a transparent attempt to use a hosting provider’s phishing
complaint process to bypass the legal standards required for a court-ordered takedown—standards
Mr. Siah knows he could not possibly meet.</p>
<p>While the complainant also newly mentions “intellectual property rights,” he has failed to
identify any specific copyrighted material or patented technology being infringed. Mr. Siah
appears simply to be trawling through legal theories and accusations, hoping one will stick—an
ironic strategy for a complaint filed under “phishing.”</p>
<p>In summary, this complaint should be dismissed as frivolous. The complainant has failed to
identify any violation of Hetzner’s Terms of Service, any applicable law, or any actual abuse. If
the complainant or his alleged client, or <em>their</em> alleged government clients, wish to challenge my
exercise of free speech or my lawful publication of public records, avenues exist outside
Hetzner’s phishing complaint process.</p>
</blockquote>
<p>I will update this post when Hetzner responds. In the meantime, the site remains online, the public
records remain searchable, and the audit logs continue to tell stories the company would rather you
not read—like yesterday’s article on
<a href="https://footnote4a.org/news/amber-reasons">how 3,466 Flock searches failed to find a missing teen, while a woman at a Nebraska truck stop succeeded</a>,
or the newly-published logs showing a Texas officer justified a 30-day nationwide location history
lookup with the reason “<a href="https://footnote4a.org/profiling-records?q=gypsy&amp;sort=date_desc">gypsy crap</a>.”</p>
<h2 id="flock">Part III + ½: Support from Flock</h2>
<p>It turns out
<a href="https://footnote4a.org/blog/colwell-files/email.pdf">Flock already sent a statement in support of haveibeenflocked.com</a>
to its customers.</p>
<p>I forwarded it to Hetzner:</p>
<blockquote>
<p>Dear Hetzner,</p>
<p>Please find attached a customer communication from Flock Safety discussing my website—the same
website Cyble alleges “discloses extensive, sensitive information obtained from Flock.”</p>
<p>In this email, dated December 8, 2025, Chris Colwell, Flock’s Vice President of Solution
Engineering, writes to “provide factual context about what is happening”:</p>
<blockquote>
<p>Recently, a third-party website began aggregating search information that appears to have been
released through these public-records processes.</p>
</blockquote>
<p>And, under “What’s happening”:</p>
<blockquote>
<p>Based on what we have seen, websites like the one circulating online are using agency-released
public-records data.</p>
</blockquote>
<p>The email lists customer “concerns.” Causing “concerns” about government surveillance is a side
effect of legitimate, transparent reporting. It is neither “phishing,” nor a violation of
Hetzner’s Terms of Service.</p>
<p>Flock’s own communications confirm what I have stated from the outset: my website publishes
government records released through public records processes. This is protected journalism, not
“phishing.”</p>
<p>Nevertheless, nine days after Flock’s email, Cyble filed a phishing complaint with Hetzner.
Instead of presenting any evidence of any violation, Cyble made various unsupported allegations
about copyright and trademarks.</p>
<p>Flock knew the nature of my website before it sent Cyble to file the complaint. It was a
deliberate fabrication to shut down reporting on the company’s activities.</p>
<p>I ask again that this baseless complaint be dismissed. No evidence of any violation has been
presented, and the complainant’s own client has contradicted the allegations in writing.</p>
<p>I also respectfully suggest that Hetzner consider whether Cyble should remain a trusted source for
abuse reports, given their demonstrated willingness to misuse this process against legitimate
customers.</p>
<p>Finally, in the interest of transparency and potential further actions, I request that Hetzner
forward the attachment referenced—but not included—in the previous notification.</p>
</blockquote>
<p>Good looking out, Flock.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Because, unlike Flock’s “reason” field,
<a href="https://footnote4a.org/news/dupage-county-2">my inputs don’t accept arbitrary values</a>. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[The "Public Roads" Myth: Why Mass Surveillance Violates the Fourth Amendment]]></title>
            <link>https://footnote4a.org/news/public-roads</link>
            <guid isPermaLink="false">https://footnote4a.org/news/public-roads</guid>
            <pubDate>Thu, 18 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[The Fourth Amendment protects people, not places.]]></description>
            <content:encoded><![CDATA[<p>One of the most persistent arguments for mass surveillance is that “there is no reasonable
expectation of privacy on public roads.” Proponents argue that when the government hires companies
like Flock to track citizens, no rights are violated because the tracking happens in public.</p>
<p>This reasoning is an annoying legal anachronism. It relies on a version of the law that died
in 1967.</p>
<p>The government’s focus on the “public” nature of the road is exactly the “misleading” formulation
the Supreme Court warned about in <em>Katz v. United States</em>, a case often erroneoulsy cited in support
of the “public roads” argument.</p>
<p>In that case, the government argued that a phone booth was a public area and therefore not
“constitutionally protected.” The Court rejected that geography-based argument as a distraction:</p>
<blockquote>
<p>For the Fourth Amendment protects <strong>people, not places</strong>. […] This effort to decide whether or
not a given ‘area,’ viewed in the abstract, is ‘constitutionally protected’ deflects attention
from the problem presented by this case. — <em>389 U.S. 347, 351 (1967)</em>.</p>
</blockquote>
<p>While the majority established the “people, not places” rule, Justice Harlan’s concurrence in <em>Katz</em>
created the two-pronged test courts use today to determine if a search occurred:</p>
<ol>
<li>Subjective: Did the person exhibit an actual expectation of privacy?</li>
<li>Objective: Is that expectation one that society recognizes as “reasonable”?</li>
</ol>
<p>Crucially, Harlan noted that even in areas accessible to the public (like a telephone booth), an
individual can still hold a constitutionally protected interest in their privacy.</p>
<p>In 2018, the Court addressed this again in <em>Carpenter v. United States</em> — Another case that often
comes up in the Flock debate.</p>
<p>The government argued that location records weren’t protected because they were held by a third
party (Sprint) and tracked movement in the public sphere.</p>
<p>The Court flatly disagreed, echoing the logic of the <em>Katz</em> Court when addressing both elements of
that claim:</p>
<blockquote>
<p>A person does not surrender all Fourth Amendment protection by venturing into the public sphere. —
<em>585 U.S. 296, 310 (2018)</em>.</p>
</blockquote>
<p>And,</p>
<blockquote>
<p>[The “third-party business records”] distinction does not negate Carpenter’s anticipation of
privacy in his physical location. — <em>585 U.S. 296, 311 (2018)</em>.</p>
</blockquote>
<p>The Court made it clear: just because your privacy interests are “diminished” in public does not
mean the Fourth Amendment “falls out of the picture entirely.”</p>
<p>That message in <em>Carpenter</em> echoed <em>Katz</em>: People, not places.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>Whether the data is collected by a third-party contractor, obtained through commercial channels, or
recorded on a public street, the legal line is consistent: The protection follows the person.</p>
<p>The argument that “there is no privacy on a public road” is a relic of pre-1967 thinking.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>What the <em>Carpenter</em> Court did <em>not</em> say is what Norfolk (in <em>Schmidt v. Norfolk</em>) claims: that
the Fourth Amendment <em>only</em> applies to “the whole of a person’s movements.” <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock and Cyble Inc. Continue to File False Notices]]></title>
            <link>https://footnote4a.org/news/cyble-part2</link>
            <guid isPermaLink="false">https://footnote4a.org/news/cyble-part2</guid>
            <pubDate>Wed, 17 Dec 2025 14:00:00 GMT</pubDate>
            <description><![CDATA[When a government contractor pays a company for "Takedown Services" to prevent transparency in government (Part II)]]></description>
            <content:encoded><![CDATA[<p>If you missed yesterday’s <a href="https://footnote4a.org/news/cyble-downtime">Part I</a>, go read that first. As of right now,
December 17, 2pm Cornfield Standard Time, Cloudflare is still reviewing the notice from Part I. The
same Cyble, Inc. employee has now filed a similar notice with Hetzner; <a href="http://haveibeenflocked.com">haveibeenflocked.com</a>’s
current hosting provider.</p>
<p>The full text of the abuse notice is below, as well as the complete response.</p>
<p>Stay tuned.</p>
<h2>Notice (Part 2)</h2>
<pre>
Form Data
===============================================
Name: Thomas Siah
E-Mail: response@cyble.com
Language: en
Forward report: ALLOWED
===============================================
Abuse data
===============================================
Source: haveibeenflocked.com
Category: phishing
Description:
------------------------------------
</pre>
<blockquote>
<p>Cyble Inc. represents Flock Group Inc. (hereinafter ‘our Client’),in the monitoring and worldwide
enforcement of its brand presence.</p>
<p>Our Client is the registered owner of the trademark “Flock Safety” including USA under
registration number 6842958. Please see the official website <a href="https://www.flocksafety.com/">https://www.flocksafety.com/</a>.</p>
<p>We recently became aware of the URL of which you are the named administrative contact. The website
publicly and deliberately releases extensive, sensitive information obtained from Flock .</p>
<p>Additionally, the website may be used to phish the general public on the name of Flock Safety
which is a serious concern to notify you.</p>
</blockquote>
<pre>
Infringing URLs : <https://haveibeenflocked.com/>
5.78.142.181
</pre>
<h2>The Response</h2>
<p>Dear Hetzner Abuse Team,</p>
<p>This complaint should be dismissed. It is the second frivolous takedown attempt by the same
complainant within days, and—like the first—it fails to identify any specific violation of Hetzner’s
Terms of Service, any applicable law, or any actual abuse.</p>
<p>The complaint is labeled “phishing” but describes no phishing. The complainant:</p>
<ul>
<li>Identifies no deceptive content</li>
<li>Identifies no attempt to harvest credentials or sensitive data</li>
<li>Identifies no impersonation of Flock Safety</li>
<li>Provides no evidence supporting his speculation that the site “may be used to phish”</li>
</ul>
<p>The site’s only input fields accept license plate numbers (which are hashed client-side before
transmission and cannot be harvested) and general search queries. There is no login, no credential
collection, no payment processing.</p>
<p>The complainant mentions Flock’s trademark registration but alleges no trademark infringement. Any
references to Flock Group, Inc. constitute nominative fair use—the same principle that permits
Consumer Reports to name the products it reviews.</p>
<p>The website is a transparency and accountability tool. It indexes government records released
through public records requests (FOIA equivalents), makes them searchable, and provides interpretive
analysis.</p>
<p>These records—typically audit logs showing how law enforcement agencies use Flock’s surveillance
network—are released by government entities, not obtained through any unauthorized means.</p>
<p>This is journalism, and it serves the public interest. Flock’s practices are subjects of legitimate
public concern, as documented by:</p>
<ul>
<li>ACLU: <a href="https://www.aclu.org/news/privacy-technology/flock-roundup">https://www.aclu.org/news/privacy-technology/flock-roundup</a></li>
<li>EFF:
<a href="https://www.eff.org/deeplinks/2025/11/how-cops-are-using-flock-safetys-alpr-network-surveil-protesters-and-activists">https://www.eff.org/deeplinks/2025/11/how-cops-are-using-flock-safetys-alpr-network-surveil-protesters-and-activists</a></li>
<li>404 Media:
<a href="https://www.404media.co/ice-taps-into-nationwide-ai-enabled-camera-network-data-shows/">https://www.404media.co/ice-taps-into-nationwide-ai-enabled-camera-network-data-shows/</a></li>
<li>Wired: <a href="https://www.wired.com/story/flock-uses-overseas-gig-workers-to-build-its-surveillance-ai/">https://www.wired.com/story/flock-uses-overseas-gig-workers-to-build-its-surveillance-ai/</a></li>
<li>US News:
<a href="https://www.usnews.com/news/us/articles/2025-11-20/georgia-police-chief-charged-with-using-license-plate-readers-to-stalk-and-harass-people">https://www.usnews.com/news/us/articles/2025-11-20/georgia-police-chief-charged-with-using-license-plate-readers-to-stalk-and-harass-people</a></li>
</ul>
<p>Examples of the government-released records indexed on the site:</p>
<ul>
<li><a href="https://www.muckrock.com/foi/mount-prospect-8189/flock-safety-alpr-audits-2025-mount-prospect-police-department-186694/files/">https://www.muckrock.com/foi/mount-prospect-8189/flock-safety-alpr-audits-2025-mount-prospect-police-department-186694/files/</a></li>
<li><a href="https://www.muckrock.com/foi/prosser-8485/flock-safety-search-audits-network-sharing-and-general-order-prosser-police-department-186565/">https://www.muckrock.com/foi/prosser-8485/flock-safety-search-audits-network-sharing-and-general-order-prosser-police-department-186565/</a></li>
</ul>
<p>Flock itself publicly extols such transparency, describing audit logs on its own website as “the
living record that shows every search, every audit, every moment where technology intersects with
justice.”
(<a href="https://www.flocksafety.com/blog/policy-pulse-transparency-control-and-the-path-forward">https://www.flocksafety.com/blog/policy-pulse-transparency-control-and-the-path-forward</a>)</p>
<p>The complainant, Thomas Siah of Cyble Inc., has now submitted two successive takedown requests in
short order. Neither complaint:</p>
<ul>
<li>Demonstrates any relationship between Cyble Inc. and Flock Group, Inc.</li>
<li>Establishes authority to act as Flock’s agent</li>
<li>Identifies any specific unlawful content</li>
<li>Provides evidence of any actual abuse</li>
</ul>
<p>This is a transparent attempt to use Hetzner’s abuse process to suppress speech critical of a
surveillance company—the kind of abuse that hosting provider policies are not designed to
facilitate.</p>
<p>I respectfully request that Hetzner dismiss this complaint and note the pattern of frivolous
submissions from this complainant.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock Records Cops, Sends Recordings to Denmark]]></title>
            <link>https://footnote4a.org/news/dps-denmark</link>
            <guid isPermaLink="false">https://footnote4a.org/news/dps-denmark</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Evidence reveals Flock records police sessions and transmits raw data to foreign vendors, bypassing security controls.  A complaint to Iowa DPS details active security incidents, the use of unvetted foreign contractors, and a software feature allowing users to unilaterally silently suppress NCIC alerts organization-wide.]]></description>
            <content:encoded><![CDATA[<p>“<em>Everything you do is being watched and recorded.</em>”</p>
<p>The warning that Flock sends America equally applies to its own customers. Flock doesn’t limit
itself to
<a href="https://footnote4a.org/news/overseas-data">gig-workers in the Philippines classifying screams heard on American streets</a>;
it records its users’ screens and sends those recordings to commercial vendors in Denmark and the
United States.</p>
<p>If you have recently attended a city council meeting discussing surveillance, you’ll have noticed
that Flock, police, and their council members, often dismiss warnings of harm and abuse as
speculative. The overarching theme is that police encourage elected officials to react to
violations, not to expend effort trying to prevent them.</p>
<p>But the Internet is not a big truck. You can’t put the toothpaste back in its tubes. That’s why we
have rules, regulations, and safeguards: to <em>prevent</em> harm from occurring. Here in Iowa, we have
Chapter 692. Federally, we have the FBI’s NCIC (CJIS) framework. These frameworks require contracts,
audits, and, perhaps most importantly, continuous careful monitoring and oversight.</p>
<p>The letter below, sent today to the Iowa Department of Public Safety, details how Flock’s security
failures not only undermine the integrity of the federal NCIC system but also allow individual users
to “silence” felony warrants organization-wide without approval.</p>
<p>Maybe Flock’s CEO’s “it is a local decision. Not my decision, and not Flock’s decision” extends to
federal warrants and mitigating critical P1 vulnerabilities.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> For obvious reasons, federal law
would disagree.</p>
<h2>The Complaint</h2>
<p>I normally don’t post direct copies of my communications with Iowa agencies. What you see posted
here tends to be summaries and excerpts. Not because I think they should be secret, but because
there are quite a few. Responses are few and <a href="https://footnote4a.org/news/iowa-logs">tend to be highly inconsistent</a>.</p>
<p>The letter below is an episode in a long, continuing series that began well before the
<a href="https://footnote4a.org/news/federal-insecurity">Iowa Department of Public Safety determined Flock operates a federally regulated system</a>.</p>
<p>Iowa DPS has been ignoring most of my letters and complaints for a few years now.</p>
<p>This one documents some fairly egregious violations.</p>
<p>Are you a defense attorney looking to prove a police officer went on an unconstitutional fishing
expedition, or entered a bunch of bullshit into the hotlist system? Congrats, you can subpoena the
screen recordings directly from Flock’s vendors.</p>
<p>The harm itself has been done. It can’t be undone. It can only be mitigated.</p>
<p>But it won’t be.</p>
<hr>
<p class="text-right">December 17, 2025</p>
<p>To the Iowa Department of Public Safety:</p>
<p>I am writing to formally notify the Department, in its capacity as the CJIS Systems Agency (CSA), of
active security incidents involving the unauthorized transmission of Criminal Justice Information
(CJI) and the existence of multiple software mechanisms undermining the integrity of the NCIC
system.</p>
<p>These violations involving Flock Group, Inc. (dba “Flock Safety”) are distinct from the federal
grant and CJIS Security Policy (CJISSECPOL) compliance issues I reported in separate communications
in October, November, and December. Although the Department found in September 2025 that this vendor
operates a regulated criminal justice information system, these unauthorized disseminations of CJI
are occurring regardless of the system’s formal classification.</p>
<p>The Department must address these critical data spills under both its contractual obligations and
authority as the CSA in the FBI’s CJIS program, and its distinct statutory authority under Iowa Code
Chapter 692 to oversee statutory restrictions on the dissemination of intelligence data and criminal
history information.</p>
<h3>UNAUTHORIZED TRANSMISSION TO FOREIGN AND COMMERCIAL ENTITIES</h3>
<p>The Flock platform integrates third-party surveillance code that bypasses privacy controls and
transmits CJI to unauthorized vendors. Several of Flock’s applications load executable code directly
from servers operated by “Fullview,” a Danish corporation. Fullview is designed to “see the user[']s
screen to be contextually aware,” granting unvetted foreign nationals access to active CJIS
sessions. In addition to Fullview, Flock enables the behavioral analytics vendor “Fullstory” to
separately record user sessions. While Fullstory includes limited “masking” functionality, Flock’s
“hotlist” application contains custom code (see Appendix A) that is explicitly programmed to capture
raw HTML code—including the CJI it may contain—and transmit it to third-party servers before masking
can occur.</p>
<p>On December 1, 2025, national media—including <em>Wired</em> and <em>404Media</em>—confirmed Flock as using
“Upwork” contractors in the Philippines, to manually annotate images and audio. This practice
creates a pathway through which images and audio recordings are made accessible to unvetted foreign
nationals for manual review. Dissemination of CJI in this way is a direct violation of CJISSECPOL’s
controls on foreign national access.</p>
<p>The system transmits user identities (names, emails, agency affiliations) to Twilio Segment along
with behavioral metadata (see Appendix B). This mechanism becomes critical considering the May 2025
“Altoona/Texas” incident I reported on November 29, wherein an officer entered full names, dates of
birth, and criminal history details regarding an active Texas investigation into a non-validated
Flock “reason” field. Because Segment links specific user identities to these metadata fields, the
automated fanning out of this data via commercial connectors creates an uncontrolled dissemination
vector. This subjects sensitive investigative data to commercial data mining and persists it on
systems not authorized to process CJI.</p>
<h3>SYSTEMIC FAILURE TO MONITOR</h3>
<p>In addition to the publicly disclosed “foreign worker” vulnerability, “P1” (as defined by
CJISSECPOL) vulnerabilities came to light in May and November of 2025. Flock published these via
NIST’s National Vulnerability Database and through direct customer advisories.</p>
<p>The Department appears to have taken no documented action in response to these disclosures by its
vendor. On December 8, 2025, the Department responded to my open records request, stating it
possessed “no responsive documents” regarding Flock vulnerabilities or incidents between February 1
and November 26, 2025.</p>
<p>The absence of any records or correspondence regarding confirmed breaches constitutes an admission
of systemic failure. It demonstrates a total collapse of the “continuous monitoring” required by
CJISSECPOL. Each of the 50+ Iowa Contracting Government Agencies (CGAs) should have disclosed these
incidents to the CSA. Any audit DPS conducted after February 2025 should have revealed these issues.
The Department neither asserts implausible ignorance, nor does it act.</p>
<h3>UNILATERAL, UNMONITORED SUPPRESSION OF NCIC ALERTS</h3>
<p>The software includes an alert suppression feature permitting individual users to permanently
silence NCIC alerts organization-wide (see Appendix C). This allows a single user to unilaterally
blind an entire agency to active warrants for violent felonies or stolen vehicles, creating
operational risks to officer safety and liability for the Department.</p>
<p>The suppression mechanism lacks a mandatory multi-step approval workflow, and there is no evidence
that it generates CJIS-compliant audit logs accessible to the Local Agency Security Officer (LASO).
Without LASO-accessible logs, the CGA or Department cannot verify how many valid NCIC hits have been
hidden from Iowa officers.</p>
<h3>ACTIONS REQUIRED</h3>
<p>The Department cannot claim this system is compliant for grant purposes while continuing to ignore
active data breaches. The Department also remains statutorily obligated to enforce compliance with
Iowa Code Chapter 692, under which the same set of facts gives rise to distinct violations.</p>
<p>In addition to the actions previously requested of the Department and the Bureau, I request the
Department immediately take the following actions:</p>
<ul>
<li>Order the immediate cessation of data connections to third-party session recording tools,
including Denmark-based “Fullview,” until these entities have demonstrated they meet the
requirements for handling Iowa CJI.</li>
<li>Order the immediate cessation of the use of offshore annotation for Iowa data until the vendor
demonstrates that no unvetted foreign nationals have access to Iowa intelligence data or media.</li>
<li>Direct the vendor to disable the “NCIC Suppression” feature statewide until it is proven that
compliant audit logging is active and accessible to LASOs, and that no valid warrants have been
permanently silenced to date.</li>
<li>Treat the transmission of unmasked hotlist data to Fullstory/Fullview and the offshore access as a
confirmed “Information Spillage” event and initiate the mandatory incident response capability to
assess the scope of the data loss.</li>
<li>Order the preservation of all vendor logs related to “suppressed hits” and transmitted metadata to
prevent the spoliation of evidence regarding silenced NCIC alerts and Information Spillage.</li>
</ul>
<p>I request a substantive response within fifteen calendar days.</p>
<p class="text-right"><em>CC</em>: Rusty Ringler, Bureau Chief &amp; CSO<br> Catherine Lucas, General Counsel<br> FBI Information
Security Officer<br> FBI CJIS Audit Team</p>
<hr>
<h3>APPENDIX A: FULLSTORY CODE IN “HOTLIST” APPLICATION</h3>
<pre><code class="language-javascript">// Attaches click listener to all events, calling ‘restart’
static handleClicks() {
  document.addEventListener(“click”, this.restart.bind(this), { capture:
!0 });
}
// ‘restart’ calls sendClickedElement
static restart(e) {
  this.timerRef &amp;&amp; (window.clearTimeout(this.timerRef), this.timerRef = null),
    this.startTimer(),!this.isRecording &amp;&amp; (FS.restart(),
    this.sendClickedElement(e), this.isRecording = !0)
}
// Sends t.outerHTML (before masking) to Fullstory
static sendClickedElement(e) {
  let t = e.target, a = t &amp;&amp; t.outerHTML ? t.outerHTML : “&lt;html not found&gt;“,
    i = a.length &gt; this.CLICKED_ELEMENT_HTML_LIMIT ?
    ““.concat(a.slice(0, this.CLICKED_ELEMENT_HTML_LIMIT), “...(too many
    characters)”) : a;

  FS.event(this.restartEventName, {
    clickedElementOuterHTML_str: i
  })
}

</code></pre>
<hr>
<h3>APPENDIX B: TWILIO SEGMENT INTEGRATION</h3>
<pre><code class="language-javascript">// Initialize Segment
t0 = a(52295).b.load({ writeKey: e6.segmentKey });

// Identify the user by name, email, organization
MY = () =&gt; {
let e = (0, ej.v9)(tq.selectors.selectAccount);

(0, eC.useEffect)(() =&gt; {
e &amp;&amp; (t0.identify(e.id, {
  name: e.name,
  email: e.email,
  organizationId: e.organizationId,
  organizationName: e.orgName,
  organizationType: e.orgType
}), t0.group(e.organizationId, {
  organizationName: e.orgName,
  organizationType: e.orgType
}))
}, [e])
}

// Create a Raven export tracking event associated with the user
t0.track(“Raven PDF Export Selected”)

// Track a user-associated event for the hotlist application
ad = () =&gt; ({
  track: (0, eC.useCallback)((e, t) =&gt; {
  t0.track(e, { ...t, hostName: “hotlistBeta” })
}, []),
trackDebounced: (0, eC.useMemo)(() =&gt; (0, as.debounce)((e, t) =&gt; {
  t0.track(e, { ...t, hostName: “hotlistBeta” })
}, 2e3), [])
})

</code></pre>
<p><em>Note</em>: This code demonstrates the mechanism by which user identities and behavioral events are
transmitted to Segment. The “Altoona/Texas” incident referenced above demonstrates that users enter
CJI into the metadata fields that this system captures and transmits.</p>
<hr>
<h3>APPENDIX C: NCIC SUPPRESSION</h3>
<pre><code class="language-javascript">// Suppression API endpoint
async function oY(e) { // CREATE suppressed hit
  let t = await aI(&quot;POST&quot;, e),
  a = await fetch(&quot;&quot;.concat(e6.apiUrl,
  &quot;/api/v1/organization/suppressedHits&quot;), t);
}

// UI text confirming organization-wide scope
children: &quot;Suppressed hits will not send alerts to any user in your organization.&quot;;

// NCIC as suppressible source type
sourceName: &quot;NCIC&quot;,
reason: &quot;Sex Offender&quot;,

// Suppressed hits silently filtered from notification stream
if (&quot;suppressionId&quot; in t &amp;&amp; t.suppressionId) break;

// Logging goes to Segment analytics, not CJIS-compliant audit system
n(&quot;Suppressed Hit Saved&quot;, {
suppressedHitSettings: { expiration: e.expiry || &quot;none&quot; }
});

</code></pre>
<p><em>Note</em>: This code demonstrates that (1) any user with the canManageSuppressedHits permission can
suppress alerts organization-wide without approval workflow; (2) NCIC is a suppressible source type;
(3) suppressed alerts are silently dropped from the notification stream; and (4) logging to
commercial analytics (Twilio Segment), not CJIS-compliant audit infrastructure.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Note for <a href="http://haveibeenflocked.com">haveibeenflocked.com</a> readers: <a href="https://le.fbi.gov/file-repository/cjis_security_policy_v6-0_20241227.pdf">CJISSECPOL</a> classifies the most severe types of
compliance issues as “P1.” These include many of the issues <a href="https://gainsec.com/2025/11/05/formalizing-my-flock-safety-security-research/">Jon Gaines discovered in February
2025</a> (discussed in Benn Jordan’s <a href="https://www.youtube.com/watch?v=uB0gr7Fh6lY">“We Hacked Flock Safety Cameras in Under 30
Seconds.”</a>). P1 issues require certain actions, including remediation within 15 days and
submitting notification to the CSA (Iowa DPS) and the FBI within 15 days. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock and Cyble Inc. Weaponize "Cybercrime" Takedowns to Silence Critics]]></title>
            <link>https://footnote4a.org/news/cyble-downtime</link>
            <guid isPermaLink="false">https://footnote4a.org/news/cyble-downtime</guid>
            <pubDate>Tue, 16 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[When a government contractor pays a company for "Takedown Services" to prevent transparency in government]]></description>
            <content:encoded><![CDATA[<p><strong>Cyble Inc.</strong>, a firm marketing itself as a service to
<a href="https://cyble.com/solutions/takedown-services/">“Disrupt Cybercrime,”</a> recently attempted to
disrupt something else entirely: government accountability.</p>
<p>Cyble, claiming to act on behalf of Flock, filed a series of demonstrably false abuse reports with
our hosting provider, Cloudflare, to scrub this site from the internet. Their strategy? Accuse us of
“phishing” and “trademark infringement” to hide the information we publish.</p>
<h2>The Evidence</h2>
<p>Here is the text of the actual report Cyble filed against us:</p>
<blockquote>
<p><strong>Report ID</strong>: 440e11…<br> <strong>Logs or other evidence of abuse</strong>: The mentioned website is
wrongfully using our client’s registered trademark in the fake web page. The use of the Client’s
registered trademark descriptively in the reported URL in order to disguise or phish the general
public has not been authorized by our client. The website publicly and deliberately releases
extensive, sensitive information obtained from Flock.<br> <strong>Reported URLs</strong>:
hxxps://haveibeenflocked[.]com/<br> <em>Below are the report submitter’s details</em>:<br> <strong>Submitter’s
Name</strong>: Thomas Siah<br> <strong>Submitter’s Email Address</strong>: <a href="mailto:response@cyble.com">response@cyble.com</a></p>
</blockquote>
<h2>Throwing Mud at the Wall</h2>
<p>Looking at the report, it is difficult to tell what the actual complaint is.</p>
<p>Are we infringing on a trademark?</p>
<p>Are we running a “fake website”?</p>
<p>Are we “disguising or phishing the general public”?</p>
<p>Or is the real issue that we are publishing public records—which they falsely claim were “obtained
from Flock”—that expose the rampant abuse of Flock’s mass surveillance platform?</p>
<p>Cyble’s representative, Thomas, is simply making every allegation possible in the hope one will
stick, regardless of the evidence. Apparently, filing false reports against critics is a winning
strategy for them.</p>
<h2>Update: Cloudflare Responds</h2>
<blockquote>
<p>Hedwig (Cloudflare)</p>
<p>Dec 18, 2025, 9:16 AM PST</p>
<p>To Whom It May Concern:</p>
<p>If you can show this information is publicly available and/or shared with the consent of the
person, please provide us with a link to the original public sources or documentation verifying
this consent.</p>
<p>Regards, Cloudflare Trust &amp; Safety</p>
</blockquote>
<p>What “this information” refers to, or how showing the sources (which <a href="https://footnote4a.org/sources">are available here</a>)
would help establish this is not a phishing website is anyone’s guess.</p>
<h2>We Aren’t Going Anywhere</h2>
<p>Ultimately, this is a minor inconvenience. It took me about an hour—after I finished playing my
video game<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup>—to change the code and migrate the site off Cloudflare’s infrastructure.</p>
<p>The suspension has been appealed, but we aren’t waiting for permission to exist.</p>
<p><em>Update</em>: The site has been fully moved over. If we <a href="https://footnote4a.org/news/cyble-part2">are blocked again</a> it should
be straightforward to move anywhere.</p>
<p><a href="https://discord.com/invite/aV7v4R3sKT">Come hang out on Discord</a> with other people who
believe in oversight, accountability, and the rule of law.</p>
<p>We will continue to expose Flock for what it is: a company so contemptuous of civil liberties that
its CEO will paint active citizenship as
<a href="https://www.youtube.com/watch?v=fVCVQcd9PLc#t=11m50s">terrorism</a>, and now, apparently,
cybercrime.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>With the new Divinity game in the works, I decided to do a run as Gale in BG3. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Vector State: License Plates for Pedestrians]]></title>
            <link>https://footnote4a.org/news/reid</link>
            <guid isPermaLink="false">https://footnote4a.org/news/reid</guid>
            <pubDate>Mon, 01 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Flock's cameras have face detection triggers and use ReID technology to track people by appearance—treating humans like license plates.]]></description>
            <content:encoded><![CDATA[<p>An oft-repeated claim is that Flock cameras don’t detect people, and when they do it’s only basic
movement detection, and totally not facial detection. At this point, would we be surprised if pretty
much all of that turned out to be a lie?</p>
<h2>Ghost in the Machine: The “Face Detection” Switch</h2>
<div class="markdown-alert markdown-alert-note">
<p class="markdown-alert-title">Note</p>
<p>First, a small disclaimer: so far, we have no evidence that Flock is using facial
recognition in production. This section discusses confirmed <em>capabilities</em>, not actual use.</p>
</div>
<p>With that out of the way, this is the list of triggers defined for Flock devices, as found in one of
their web applications:</p>
<ul>
<li>Manual</li>
<li>Common alarm</li>
<li>Motion detection</li>
<li>Input switch alarm</li>
<li>Video loss</li>
<li>Audio detection</li>
<li>Pos info</li>
<li>Scheduled recording</li>
<li>Face detection</li>
<li>Cross line detection</li>
<li>Intrusion detection</li>
</ul>
<p>Some of these are marketed features; like alerts when video signals are lost, or when persons cross
a boundary defined on Flock’s PTZ cameras. This list is not device-specific<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup>, so “Audio
detection” is presumably for the Raven <a href="overseas-data">scream detector</a>.</p>
<p>As far as this author is aware, “Face detection” is not an advertised feature of any Flock product.</p>
<p>But it’s on the trigger list.</p>
<p>Is it in operational use? If so, by what device(s)?</p>
<p>Contracting government agencies signed away their right to know. And Flock certainly wouldn’t tell
us if they did have the feature in active use.</p>
<h2>Faceless Identity in 2kB or less</h2>
<p>Maybe it doesn’t matter — we know that Flock’s <a href="overseas-data">outsourced data labeling platform</a>
classifies photos and screams, but that same analysis also revealed that it lets our foreign friends
train another feature: <a href="https://iq.opengenus.org/person-reidentification/">ReID</a>. A machine learning algorithm that tracks persons as they move between
cameras.</p>
<p>While details on Flock’s actual implementation are sparse, examining an <a href="https://github.com/KaiyangZhou/deep-person-reid">open source project like
torch-reid</a> as a model implementation reveals the broader implications.</p>
<p>ReID works by creating a vector, a small (~2kB) file representation of a person. Because of their
small size, a virtually unlimited number of these vectors can be stored at extremely minimal cost.
The latest 1TB iPhone can hold the vector for every American, Mexican, and Canadian alive, and would
still have room for Facebook.</p>
<p>These vectors are not “photos.” They’re very likely also not contractually “Footage.” Whatever
rights your PD thinks it has, it probably does not include vectors.</p>
<p>This is combined with soft biometrics, which includes things like clothing (color, type), apparent
gender, accessories, and body mechanics (height, body shape, etc.).</p>
<p>That process is much cruder than facial recognition.</p>
<p>The type of data lines up perfectly with the search we’ve seen in
<a href="https://footnote4a.org/moderation-logs">moderation logs</a>, where we have someone searching for a “red shirt”:</p>
<p><img src="https://footnote4a.org/blog/reid/redshirt.png" alt="Moderation log showing &quot;red shirt&quot; search"></p>
<p>And with Flock’s advertised person search features:</p>
<p><img src="https://footnote4a.org/blog/reid/camo-hat.png" alt="Missing person in hi-vis vest carrying leafblower" width="400"></p>
<p>Where ReID becomes highly accurate (and concerning) is through temporal correlation. Once you know a
specific person is at a specific location—maybe because they were seen exiting or, possibly, even
driving a vehicle with a license plate tied to a person—you can track them.</p>
<p>No face required.</p>
<p>The quasi-good news is that under laws like Illinois’ Biometric Information Privacy Act, this is
likely considered biometric data and its collection is therefore heavily regulated.</p>
<p>Cities with strong protections include Portland, OR, San Francisco, CA, Boston, MA, and New York
City. States include Illinois, Texas, and Washington.</p>
<p>The bad news, as always, is that the government does nothing to enforce its own laws.</p>
<h2>The End of Public Anonymity</h2>
<p>With this, Flock has placed itself into an even more precarious legal situation. Already in trouble
after <a href="federal-insecurity">classifying itself as a CJIS compliant entity</a>, now, it’s not only
collecting biometrics, it’s tracking people walking.</p>
<p>There is no “driving is a privilege” defense. Existing in public is a fundamental right.</p>
<p>For now, until the government acts, all we can do is wear specific adversarial clothing to defeat
ReID and don ski masks to defeat facial recognition.</p>
<p>This is the future your money is buying from Flock.</p>
<p><img src="https://footnote4a.org/blog/reid/hoodie.jpg" alt="Adversarial patch hoodie" width="500"></p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>More specifically, research so far has not turned up a related device. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@pm.me (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Federal Insecurity: How Flock Lies to the Feds]]></title>
            <link>https://footnote4a.org/news/federal-insecurity</link>
            <guid isPermaLink="false">https://footnote4a.org/news/federal-insecurity</guid>
            <pubDate>Fri, 28 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Flock's security chief certified FBI compliance despite knowing their devices fail basic security requirements. Either they handle sensitive data illegally, or they lied.]]></description>
            <content:encoded><![CDATA[<p>Flock and its customers have played a regulatory <a href="riss-shell-game">shell game</a> for years: they claim to take
pictures of license plates that are visible on public roads, and, therefore, there are no privacy or
Fourth Amendments concerns. Robert Otten, Flock’s Senior Director Cybersecurity and Risk Management,
just certified to the federal government his company has been lying all along.</p>
<p>The FBI sets rigid standards for handling “criminal justice information” (CJI). CJI includes things
like criminal histories, fingerprint databases, investigative files, and so on.</p>
<p>These standards are mainly codified in the <a href="https://le.fbi.gov/file-repository/cjis_security_policy_v6-0_20241227.pdf/view">CJI Systems Security Policy (CSP)</a>: 461 pages of
technical and operational security standards.</p>
<p>Otten signed a federal addendum certifying CJIS compliance for Story County, Iowa, invalidating the
company’s years of “we don’t handle sensitive information” claims. Worse, he signed it despite
knowing that Flock’s devices fail the FBI policy’s most basic security requirements.</p>
<p>Either Flock handles criminal justice information and is dangerously non-compliant, or it doesn’t
and its security chief just lied to the federal government.</p>
<p>There is no third option.</p>
<h2>Certified, Sealed, and Delivered</h2>
<p>Despite their insistence on “public plates on public roads,” Flock and its customers have asserted
confidentiality for ALPR data, audit logs, training materials, compliance, and so on, even going so
far as to devise a theory of Schrödinger’s Public Record, where a record’s confidentiality hinges on
whether the government has observed the record.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p>But, the most formal step it had taken up until now was contracting with Diverse Computing, Inc.,
out of Tallahassee, Florida, to be awarded that company’s “<a href="https://www.diversecomputing.com/cjis-ace-for-vendors">CJIS ACE Compliance Seal</a>.”</p>
<p>That certification is not approved or monitored by the federal government, and it is not a
requirement to handle CJI. It’s a purely commercial service the company ostensibly provides as
reassurance for the participant and, perhaps more importantly, their downstream customers.</p>
<p>Regardless of how meaningful earning a “CJIS ACE Compliance Seal” from a for-profit Florida-based
institution is, there is no formal oversight of the certification program and the seal carries no
legal weight. While the education and the vetting could have value, the “seal” itself is a purely
performative marketing gimmick.</p>
<p>Now, however, Flock has gone beyond placing a seal on its website, and it has formally admitted to
handling CJI. More importantly, it has committed to following the CSP’s security requirements:</p>
<p><img src="https://footnote4a.org/blog/federal-insecurity/maintain-program.png" alt="The Contractor will follow CJIS Security Policy"></p>
<p>This was not a document signed between well-meaning but uninformed county staff and a junior member
of the Flock sales team.</p>
<p>Flock and the county signed this document after the Iowa Department of Public Safety investigated a
complaint about Story County applying funding awarded for a criminal justice information system to a
Flock contract, without having the (CSP) records to show for it.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<p>Flock’s Senior Director Cybersecurity and Risk Management, Robert Otten, sat across the table:</p>
<p><img src="https://footnote4a.org/blog/federal-insecurity/flock-signature.png" alt="Flock Signature" width="350"></p>
<h2>The 10-foot Pole Defense</h2>
<p>Flock and the county signed this document in September, 2025, in the middle of an ongoing disclosure
period during which Flock has not fixed numerous critical vulnerabilities in its systems. As Flock’s
head of security, and designated “Security Officer” for the FBI, Otten was aware of these
vulnerabilities and Flock’s non-compliance when he certified the opposite.</p>
<p>Those of us who, like Otten, have been in the tech game for a little while, will remember 2018: the
year of <a href="https://meltdownattack.com/">Meltdown and Spectre</a>. This set of vulnerabilities, formally
<a href="https://nvd.nist.gov/vuln/detail/cve-2017-5754">CVE-2017-5754</a>, wreaked havoc on security teams globally: these were highly
<a href="https://en.wikipedia.org/wiki/Meltdown_(security_vulnerability)#Meltdown_exploit">sophisticated</a> bugs in common hardware (mainly Intel processors) allowing an attacker to
read the plaintext in memory.</p>
<p>These hardware vulnerabilities led to teams forgoing weeks of sleep and family time to roll out
patches and secure the systems in their server environments. It was a Big Deal.</p>
<p>But while Meltdown required Ph.D-level knowledge, and near nation-state resources to effectively
exploit at scale, Flock’s vulnerabilities require YouTube and a ladder.</p>
<p>In a post titled “Gunshot Detection and License Plate Reader Security Alert,” dated May of
2025—months before certifying compliance to the county and the federal government—Flock actively
attempted to downplay the severity of some of these vulnerabilities.</p>
<p>Flock doubled down in November 2025, with its “Response to Compiled Security Research on Flock
Safety Devices.” This blog post makes the bold claim that “[t]he researcher has been in contact with
Flock Safety … and notified Flock of findings earlier in 2025,” but that as of November its
response was that, “<strong>Overall, none of the vulnerabilities detailed in the report have an impact on
our customers’ ability to carry out their public safety objectives</strong>”<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup> (emphasis in
original).</p>
<p>Flock acknowledged the vulnerabilities in its hardware platforms. Unlike Meltdown, these don’t
require advanced knowledge of how CPUs work. <a href="https://www.youtube.com/watch?v=uB0gr7Fh6lY">The attack that allows you to read the sensitive
information requires either (1) a USB cable, or (2) a laptop with WiFi and knowledge about how many
times to push a button</a><sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup>. And unlike the entire cybersecurity community back in
2018, Flock did nothing.</p>
<p>Flock’s defense is that it requires “knowledge of device debugging,” the bare minimum standard for
any software developer. There are <a href="https://developer.android.com/studio/debug">easy-to-follow step-by-step instructions</a> in the
official developer documentation, and basic <a href="https://www.youtube.com/watch?v=GERlhgCcoBc">five-minute tutorial videos are available on
YouTube</a>.</p>
<p>We may as well leave the keys on the dashboard and claim car thefts aren’t a problem, because
opening the door and starting the car requires “knowledge of motor vehicles.”</p>
<p>What’s more, although the devices are left unattended on the side of the road, Flock defends their
security by arguing that they are placed “several feet above normal height.” The context is too
telling to exclude:</p>
<blockquote>
<p>As responsible stewards of customer data, upon notification we analyzed the impact of these
vulnerabilities and subsequently have made the following submissions to Mitre for inclusion in the
National Vulnerability Database.</p>
<ul>
<li>Debug interface enabled (CWE-1191)</li>
<li>Hardcoded credentials (CWE-798, CWE-259)</li>
<li>Hardcoded connection details ( CWE-798, CWE-259)</li>
<li>Clear Text Storage of Code (CWE-312)</li>
</ul>
<p>These are not material vulnerabilities, and both severity and likelihood to be exploited are low.
The exploitation of these vulnerabilities require physical access to a device and knowledge of
device debugging. If a person was able to gain physical access to the device (which is typically
placed on a pole several feet above normal height), they would still not be able to gain access to
footage, as the data is only stored for a very limited time duration on the device following its
transmission to the cloud.</p>
</blockquote>
<p>We don’t have to debate the definition of “limited time” when an attacker can install software with
full camera and network access, nor do we have to contemplate the efficacy of height when malicious
actors presumably have access to basic ladder or truckbed technology.</p>
<p>Whether they can be exploited, whether they require device access, whether they come on a stick or
are deep-fried, those issues don’t concern the CSP, which, in federal government fashion, lays out
extensive pass/fail compliance requirements. Notably, the US Department of Justice didn’t create a
5-second-rule for confidential data.</p>
<p>To name but a few of the areas of the CSP where Flock has been out of compliance, and was out of
compliance at the time of certification:</p>
<ul>
<li>“Protect the confidentiality and integrity of the following information at rest: CJI when outside
physically secure locations using cryptographic modules which are [federally] certified.”</li>
<li>“Prevent non-privileged users from executing privileged functions.”</li>
<li>“Enable user authentication and encryption mechanisms for the management interface of the
[wireless access point].”</li>
<li>“Place [wireless access points] in secured areas to prevent unauthorized physical access and user
manipulation”</li>
</ul>
<p>These aren’t speculative, debatable, or matters of questionable degree or urgency. These are
formally FBI-classified, highest priority, violations of federal laws and regulations.<sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup></p>
<p>Not something to cover under your finest blog bullshit.<sup class="footnote-ref"><a href="#footnote6">[6]</a><a class="footnote-anchor" id="footnote-ref6"></a></sup></p>
<h2>Denial, Deflection, and Dumb Sensors</h2>
<p>Given Flock’s stance thus far, I do not expect the company to take ownership now (or ever)—they will
either argue that its head security honcho, Otten, had no idea what he was doing when he signed the
contract with Story County, or, more likely, it will argue that the devices sprinkled roadside are
not covered by the CSP. Neither argument is plausible.</p>
<h2>Plausible Deniability, Implausible Competence</h2>
<p>Otten, as head of security, was aware of the highly-publicized vulnerabilities. No company puts out
press releases on issues this serious without a C-suite signoff. Especially not a company whose
business relies on a government clientele that tends to value the appearance of legal and regulatory
compliance.</p>
<p>Flock’s own blog post admits that GainSec has been in direct contact with Flock about these
vulnerabilities “since earlier this year” (which Gaines notes as February, 2025). Many of the issues
Gaines reported were not confirmed as fixed, and some were outright confirmed as “not fixed” as of
November 2025. In the middle of that period, Otten certified compliance anyway.</p>
<p>The alternative hypothetical “Otten is incompetent” defense centers on his failure to understand
what Criminal Justice Information is, or his inability to read the terms of a two-page contract
addendum.</p>
<p>These defenses might carry some weight if he had been a junior sales exec. They fall flat when the
person signing the contract has been the company’s top security director for years, after gaining
extensive experience in companies like CLEAR and KPMG.</p>
<h2>Public Records, Private Denials</h2>
<p>Asserting that photos, videos, and audio recordings taken in public places are not CJI is a
potentially persuasive position. For it to become a credible one, it requires answering a few simple
questions—among them: why did Flock agree to be bound to CSP? And why did the Iowa Department of
Public Safety require Flock to do so?</p>
<p>Even if we ignore reality, and assume that Flock’s position has all along been that it is not
operating a criminal justice information system, handling CJI, or otherwise subject to the
requirements of the CSP<sup class="footnote-ref"><a href="#footnote7">[7]</a><a class="footnote-anchor" id="footnote-ref7"></a></sup>, its Head of Security provided a certification of its compliance with
federal CJI regulations, knowing either that the system did not comply, or that it did not handle
CJI in the first place—a falsehood either way.</p>
<p>That action alone invites scrutiny under federal false statements statutes, and it should be seen as
an indicator of the level of trust that city councils should be placing in this company.</p>
<p>If they’ll lie to the feds, they’ll lie to you.</p>
<h3>Head in the Cloud</h3>
<p>This will, undoubtedly, be Flock and its customers’ primary defense. They will argue until they are
blue in the face that that the “ALPR Cameras”<sup class="footnote-ref"><a href="#footnote8">[8]</a><a class="footnote-anchor" id="footnote-ref8"></a></sup> are dumb devices that don’t process or store
CJI data (except temporarily, as Flock claims on its blog) (and unencrypted as GainSec’s research
found).</p>
<p>Let’s get that out of the way.</p>
<p>GainSec’s research also confirmed others’ earlier findings: the devices are powered by an
unsupported development kit version of Android. Android comes standard with all the tools needed for
things like wireless networking and accessing remote servers and services.</p>
<p>If you want to visualize what’s happening here: as a fully-functional computer system, from a
security (and CSP) perspective, a “camera” running Android is not the functional equivalent of a
“dumb” webcam, but the functional equivalent of a MacBook Pro<sup class="footnote-ref"><a href="#footnote9">[9]</a><a class="footnote-anchor" id="footnote-ref9"></a></sup>.</p>
<p>Now, imagine these MacBooks are up on poles, scattered throughout cities and along rural roads, with
their WiFi networks accessible to any passer-by. Imagine they are directly connected, and
provisioned with credentials (not stored with encryption, and transmitted in the clear) to access a
database that contains all the (claimed) CJI that Flock collects nationwide—billions upon billions
of datapoints on everyone’s day-to-day movements.</p>
<p>And now imagine that the company’s primary response for more than six months, and counting, has
been, “well, sure, that <em>looks</em> bad, but what you’re not realizing is that these MacBooks are on
<em>poles</em>. Not just any old poles, but above-normal-height poles. Also, the system still works, soooo
… why is this a problem?”</p>
<p>Even if you wanted to argue that the data collected by Flock is not CJI, the CSP governs entire
systems, not individual servers. Access terminals must follow the system’s security policy.</p>
<p>Putting them up on a stick and leaving them out in the country is not conducive to system security.</p>
<h3>Silver Lining, Lead Security</h3>
<p>“CSP permits cloud services,” will be the other retort. It does. It also sets clear rules for cloud
services and provides helpful, illustrative scenario-based examples.</p>
<p>Here’s one such example:</p>
<blockquote>
<p>The cloud provider, however, does not have unescorted logical or physical access to any
information system resulting in the ability, right, or privilege to view, modify, or make use of
unencrypted CJI as the SaaS provider maintains the encryption keys. In this scenario, the agency
would be required to comply with Section 5.12 for employees of the SaaS provider with access to
CJI but would not need to do so for employees of the cloud provider used by the SaaS provider.</p>
</blockquote>
<p>In other words, given that Flock employees <em>do</em> have access to unencrypted data, both in the Falcon
devices, and likely also in the cloud services, this would plainly require its employees to comply
with Section 5.12 (or, as it’s known in version 6: Policy Area PS (Personnel Security), Control
PS-3).</p>
<p>That specific control requires state and federal-level fingerprint-based background checks,
disqualifies felons, requires formal sign-off for misdemeanors, and so on.</p>
<p>Agencies must also have signed acknowledgements of the CSP on file for all contractor employees,
they must have “Information Exchange Agreements” with other agencies in place (there is no exception
for a “Nationwide sharing” checkbox), and all security vulnerabilities must be fixed within 90 days
(or 15 days for P1 violations, like those reported in February 2025).</p>
<h2>Federal Offense, Federal Oversight</h2>
<p>Your local PD is nominally in charge of oversight. But they’re not the only ones watching.</p>
<p>Under the CSP, the state’s CSA and the FBI may conduct scheduled and unscheduled audits of Flock’s
systems and facilities, and the government is no longer constrained and limited to <a href="https://www.wyden.senate.gov/news/press-releases/wyden-slams-surveillance-tech-company-for-ineffective_protections-for-oregonians-against-abuses-by-federal-agencies-and-out-of-state-law-enforcement">angry
letters</a>, <a href="https://www.koin.com/news/oregon/surveillance-company-to-protect-oregonians-data-from-immigration-abortion-inquiries-wyden/">separate agreements</a>, or <a href="https://capitolnewsillinois.com/news/hundreds-of-police-departments-use-camera-company-accused-of-breaking-state-law/">investigations hidden behind the veil
of corporate secrecy</a>. And it doesn’t stop in Iowa.</p>
<p>Because Flock is organizationally, architecturally, and operationally monolithic, CSAs in other
states are authorized to act. They have a few options:</p>
<ol>
<li>They can audit or investigate Flock customers and the Flock system for facilitating an
unauthorized connection to a criminal information (SA-9, “External System Services”).</li>
<li>Regardless of contractual ownership provisions, CJI is statutorily owned by the FBI or state; a
CSA is authorized to inspect how it’s processed.</li>
<li>As the “friendliest” option, one specifically designed with vendors like Flock in mind, the CSP
provides a reciprocity framework for audits. A CSA may request another CSA audit the system, and
CSAs may rely upon each others’ audits. (SA-9(c)(4))</li>
</ol>
<p>If you are in a state where Flock is used, your state’s CSA can act, should it choose (or be forced)
to do so.</p>
<h2>The End of the (Root) Shell Game</h2>
<p>Flock has played its regulatory shell game to the point of absurdity: telling cities it’s just a
camera, telling police it’s a crime-fighting supercomputer, and telling the public that their own
private information is a commodity to be bundled and made available in a Spotify-like subscription
package (because we promised we won’t sell it!). By signing this federal addendum, the music stops.</p>
<p>They have admitted their devices are terminals for a federal criminal justice network. They have
admitted their staff requires the same vetting as a detective or an analyst. And thanks to their own
sloppy engineering, they have demonstrated they cannot meet the standards they just swore to uphold.</p>
<p>The question now isn’t whether Flock is compliant; it’s which state Attorney General will be the
first to prosecute, and will they prosecute Flock, or will it be the cities and police departments
under whose watch this all occurred?</p>
<p>To encourage your Attorney General in their efforts, start requesting and forwarding evidence of
local agency CJIS (non-)compliance: security addenda, management control agreements, certifications
from Flock employees, audit results, review schedules, <em>et cetera</em>.</p>
<p>Local agencies can either produce the security addendum, in which case Flock’s failure to address
the glaring security holes stands as irrefutable evidence of non-compliance and failures of
oversight, or they can’t produce the documents, in which case they are running a non-compliant
connection to a system Flock swore was secure.</p>
<p>Flock must pick its poison.</p>
<h2>The Receipts</h2>
<ul>
<li><a href="https://footnote4a.org/blog/federal-insecurity/addendum.pdf">Criminal Justice Information Services Security Amendment between Story County and Flock
(9/15/2025)</a></li>
<li><a href="https://footnote4a.org/blog/federal-insecurity/csp-v6.pdf">Criminal Justice Information Services (CJIS) Security Policy v6.0 (12/27/2024)</a></li>
</ul>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>The Washington court hearing the argument <a href="https://www.eff.org/deeplinks/2025/11/washington-court-rules-data-captured-flock-safety-cameras-are-public-records">would have none of it</a>. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>This author, who also discussed CJIS matters with the county attorney before the addendum was
signed. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>Which, of course, directly contradicts its customers’ position when responding to public records
requests; the information must be withheld because its disclosure would jeopardize ongoing
criminal investigations. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>For more in-depth technical information, see Jon “GainSec” Gains’ whitepaper, <a href="https://gainsec.com/2025/11/05/formalizing-my-flock-safety-security-research/"><em>Examining the
Security Posture of an Anti-Crime Ecosystem</em></a>. <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>CSP References: SC-28, SI-7, AC-6(10), 5.20.1.1. <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote6" class="footnote-item"><p>Though it should be noted “finest” is relative; I can appreciate a good bullshit, but Flock
consistently fails to deliver even on that promise. <a href="#footnote-ref6" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote7" class="footnote-item"><p>And, therefore, the information is also not exempt from public records (FOIA) laws. <a href="#footnote-ref7" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote8" class="footnote-item"><p>Scare quotes because there is nothing particularly “ALPR” about cameras that take pictures and
use ML or other AI to process them. <a href="#footnote-ref8" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote9" class="footnote-item"><p>For the technically pedantic reader: yes, it is both technically and functionally equivalent to
a Linux server, but those don’t make good visualization aids. <a href="#footnote-ref9" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@pm.me (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Flock Ships American Surveillance Footage to Offshore Contractors]]></title>
            <link>https://footnote4a.org/news/overseas-data</link>
            <guid isPermaLink="false">https://footnote4a.org/news/overseas-data</guid>
            <pubDate>Sun, 23 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Contractors in the Philippines are labeling faces and tracking vehicles through 80,000+ Flock cameras. Local police installed them; Flock ships the data overseas.]]></description>
            <content:encoded><![CDATA[<p>Right now, contractors in the Philippines are watching American streets through more than 80,000
surveillance cameras. They’re labeling faces, tracking vehicles, and categorizing the sounds of
children screaming. All through Flock Safety’s annotation platform. Local police departments
installed these devices. Flock ships the data overseas.</p>
<p>Ever wonder how Flock’s AI cameras distinguish between different types of vehicles? How they
differentiate between children screaming and adults screaming? It’s not magic — it’s a process
called “data annotation” which uses an army of offshore gig workers to manually pore over images,
videos, and sound files.</p>
<p>This post will be heavy on images and other data pulled directly from Flock’s annotation app.</p>
<p>They largely speak for themselves.</p>
<h2>The “Springbank” Annotation Tool<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></h2>
<p><img src="https://footnote4a.org/blog/annotation/tool.png" alt="Annotation tool" width="500" class="center my-4"></p>
<p>Flock created this tool so <a href="https://www.upwork.com/ent/portal/flocksafety/">its Upwork team</a>, mostly
foreign gig workers, can review images and audio files taken by the 80,000+ cameras and microphones
liberally sprinkled throughout American cities.</p>
<p>To put it in Flock’s own words:</p>
<blockquote>
<p>Work is assigned to annotators with varying priority. For annotators that work on multiple
different projects, this priority can change frequently. It is best to follow the outlined
workflow to ensure the highest priority work is getting completed first, in addition to checking
UpWork.</p>
</blockquote>
<p>The company tracks metrics on its Upwork contractors who work to assign labels to ALPR images and
sound files:</p>
<p><img src="https://footnote4a.org/blog/annotation/graphs.png" alt="Metrics" width="700" class="center"></p>
<p>Flock’s performance dashboard shows its top annotators include workers we’ve confirmed are based in
the Philippines, along with contractors whose names suggest Eastern European origins.</p>
<p>Do the math: 80,000 cameras generating thousands of images daily, processed by contractors bidding
the lowest hourly rates. That’s potentially millions of American surveillance moments flowing
through laptops in Manila and god-knows-where-else. No security clearances. No background checks. No
oversight.</p>
<p><img src="https://footnote4a.org/blog/annotation/people-label.png" alt="People should be labeled" width="600" class="center">
<img src="https://footnote4a.org/blog/annotation/detections.png" alt="Detections" width="600" class="center"></p>
<p>Flock CEO Garrett Langley tells city councils his cameras ‘don’t identify or track people.’ But
Flock’s own training materials instruct offshore contractors to do exactly that — label every
person.</p>
<p>The company built an entire workflow around human identification while swearing to American
communities they’d never do it.</p>
<p><img src="https://footnote4a.org/blog/annotation/campaigns.png" alt="Campaigns" width="700" class="center"></p>
<p>The campaigns also include audio annotation campaigns. While Flock publicly markets Raven for
gunshot detection, the annotation categories reveal far broader audio surveillance.</p>
<p><img src="https://footnote4a.org/blog/annotation/audio-tool.png" alt="Audio annotation" width="600" class="center"></p>
<p>Flock’s microphones aren’t limited to gunshot detection; they record conversations near ATMs,
discussions outside abortion clinics, prayers at mosque entrances.</p>
<p>This annotation goes far beyond gunshot detection. Training documentation has detailed instructions
and audio samples for annotators to label and categorize:</p>
<div class="grid grid-cols-1 md:grid-cols-2 border-b border-t py-2 my-4 border-text-disabled">
<ul>
<li>Glass shattering</li>
<li>Tire screeching</li>
<li>Engine revving</li>
<li>Gunshot/firework/explosion</li>
<li>Car wreck</li>
<li>Industrial banging</li>
<li>Metal grinding</li>
</ul>
<ul>
<li>Thunder</li>
<li>Alarm</li>
<li>Screaming adult</li>
<li>Sawing</li>
<li>Sawing vs. Leaf blower</li>
<li>Background noise</li>
</ul>
</div>
<p>Flock even remarks to its team of annotators that:</p>
<blockquote>
<p>Given how hard it can be to distinguish between children and adult screaming, please make use of
the <em>certainty</em> dropdown shown on the right.</p>
</blockquote>
<p>Somewhere in Asia or Eastern Europe, someone is listening to American children in distress,
cataloguing their terror for a few dollars an hour.</p>
<h2>The (National) Security Issues</h2>
<p>This is the surveillance equivalent of letting Huawei run our 5G networks. Foreign nationals now
possess detailed movement patterns of FBI agents driving to work, military personnel visiting
family, and intelligence officers meeting sources. In any other context, we’d call this intelligence
collection. Here, we call it ‘data annotation.’</p>
<p>There is no oversight on these apps, or on these workers. Flock’s contract permits this use of the
data, and Flock’s customers assign irrevocable, worldwide licenses to Flock specifically for this
purpose.</p>
<p>The apps do not have to conform to any security standards, and, while there may be contractual
terms, it is unlikely that Flock effectively oversees data security for data in the hands of its
contractors.</p>
<p>Even if it wanted to, Flock would have very limited ability to enforce its employment agreements in
many of these countries.</p>
<p>While Senator Wyden writes stern letters about police departments forgetting to enable two-factor
authentication, Flock’s contract explicitly authorizes this overseas data hemorrhage. Every city
council that approved these cameras blessed this arrangement. They traded your privacy for crime
statistics, then acted shocked when the bill came due.</p>
<p>Flock Safety turned American streets into a foreign intelligence goldmine. Your mayor signed the
contract. Your police chief installed the cameras. And tonight, someone eight time zones away will
watch your neighbors come home, label their faces, and move on to the next task.</p>
<p>Request your city’s <a href="https://www.flocksafety.com/legal/terms-and-conditions">Flock contract</a>. Search for Section 4.1, and the ‘worldwide license’
clause:</p>
<blockquote>
<p>Customer hereby grants to Flock a limited, non-exclusive, royalty-free, irrevocable, worldwide
license to use the Customer Data and perform all acts as may be necessary for Flock to provide the
Flock Services to Customer.</p>
</blockquote>
<p>And look for Section 4.3, which promises that “These images [for machine learning] are never sold or
shared with third parties.” Apparently, foreign contractors reviewing your family’s daily movements
don’t count as ‘third parties’ in Flock’s dictionary.</p>
<p>Then ask your mayor why Bulgarian freelancers need to analyze your daughter’s walk to school.</p>
<blockquote>
<p>[!note] The information in this post was sourced exclusively from documents posted publicly online
by Flock. None of the contractors leaked information, and no unauthorized systems access was
involved.</p>
</blockquote>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>Flock’s internal systems are all named after various alcoholic beverages. From “Springbank”
handling audio annotation to “Minderaser” handling incident reports and even the flagship
FlockOS “Strawberry Soju.” <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[The Data-Sharing Shell Game: Flock, RISS, and the Federal Surveillance Backdoor]]></title>
            <link>https://footnote4a.org/news/riss-shell-game</link>
            <guid isPermaLink="false">https://footnote4a.org/news/riss-shell-game</guid>
            <pubDate>Tue, 11 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Despite Illinois' TRUST Act ban on immigration data sharing, ICE maintains backdoor access to Flock's database through RISS and local agencies.]]></description>
            <content:encoded><![CDATA[<p>In 2024, Illinois passed the <a href="https://law.justia.com/codes/illinois/chapter-5/act-5-ilcs-805/">Illinois TRUST Act</a> (5 ILCS 805), which prohibits Illinois
police from sharing data for civil immigration purposes. Earlier this year, media reported that ICE
had <a href="https://www.404media.co/ice-taps-into-nationwide-ai-enabled-camera-network-data-shows/">direct</a> and <a href="https://www.9news.com/article/news/local/next/loveland-police-colorado-ice-search/73-ec0ec084-e8c6-4c2e-a99b-68bceeedcaa1">indirect</a> access to Flock’s database — a database widely used in
Illinois. Flock’s leadership team responded first by blaming police, then by blaming its employees,
and, when the media storm had passed, by quietly resuming sharing with immigration agencies through
the backdoor.</p>
<p>Flock’s issues with data sharing are broad. While the company claims that its customers own the
data, its customers vacillate between claims that <a href="https://footnote4a.org/blog/fed-sharing/alpr-policy.pdf">they own and control access to the
data</a>,<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup> have no effective ownership, and claims that they are “<a href="https://footnote4a.org/blog/Stanwood-10-8-2025.pdf">raw,
non-governmental data held by a third-party vendor</a>.”</p>
<p>Flock also frequently claims that users must be a “<a href="https://www.youtube.com/watch?v=XBPW2TFmZAU&amp;t=6371s">sworn law enforcement officer for purposes of
accessing our law enforcement network</a>.” Flock maintains this stance, despite it
being easily disproven by examining the <a href="https://footnote4a.org/pd/">list of its customers</a> on this site.</p>
<p>In June, Flock responded to allegations of improper sharing with a statement, which summarized its
point as: <em>“it is a local decision. Not my [Flock CEO Garrett Langley’s] decision, and not Flock’s
decision.”</em></p>
<p>In August, after Illinois Attorney General Giannoulias recognized violations of the IL TRUST Act,
the company reversed course. It “paused a pilot program” after the AG’s audit uncovered that
<em>“[Flock] company leadership was unaware of a pilot program with the US Customs and Border Patrol
Protection Agency.”</em></p>
<p>This is the same leadership that claims its customers control the data.</p>
<p>But, despite being flagged as “Inactive,” <a href="https://footnote4a.org/pd/8268-federal-us-border-patrol-inactive/audit">Border Patrol can be seen running
searches</a>. ICE also continues to have broad indirect access to Flock’s database
through third parties, and through its <a href="https://www.dhs.gov/news/2025/09/17/dhs-287g-reaches-more-1000-partnerships-state-and-local-enforcement-help-remove">287(g) program</a>, which pays state and local agencies
for access to their officers and investigative tools and capacity.</p>
<p><img src="https://footnote4a.org/blog/fed-sharing/hsi-search.png" alt="Over 1,000 Searches conducted on behalf of ICE's HSI division" class="collapsible"></p>
<p>The separate pathways to unoverseeable data sharing converge and culminate in Flock’s agreements
with the <a href="https://www.riss.net/about-us/">Regional Information Sharing Systems (RISS) Program</a> — a federally funded
program to <em>“provid[e] adaptive solutions and services that facilitate information sharing”</em> with
over 10,000 member agencies <em>“in all 50 states, the District of Columbia, U.S. territories, England,
New Zealand, and parts of Canada.”</em></p>
<p>Five out of six<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup> regional RISS centers have direct access to the Flock database:</p>
<ul>
<li><a href="https://footnote4a.org/pd/6571-magloclen-riss/audit">MAGLOCLEN</a>: Middle Atlantic-Great Lakes Organized Crime Law Enforcement Network®</li>
<li><a href="https://footnote4a.org/pd/7499-rocky-mountain-information-network-rmin-riss-az/audit">RMIN</a>: Rocky Mountain Information Network®</li>
<li><a href="https://footnote4a.org/pd/3817-mocic/audit">MOCIC</a>: Mid-States Organized Crime Information Center®</li>
<li><a href="https://footnote4a.org/pd/3685-nespin-new-england-state-police-information-network/audit">NESPIN</a>: New England State Police Information Network®</li>
<li><a href="https://footnote4a.org/pd/6635-tn-rocic/audit">ROCIC</a>: Regional Organized Crime Information Center®</li>
</ul>
<p>Tools like <a href="https://www.riss.net/rissintel/">RISSIntel™</a> (“Criminal Intelligence Database Solving Cases Through
Information Sharing”) <em>“permit federated searching across many systems without requiring the RISSNET
user to have a separate user account for each partner system.”</em></p>
<p>This is, of course, completely antithetical to the idea that Flock customers maintain control of
data.</p>
<p>Exacerbating matters, RISS centers are private non-profit corporations, not government agencies. Its
users are not <em>“sworn law enforcement officer[s] for purposes of accessing our [Flock’s] law
enforcement network.”</em></p>
<p><img src="https://footnote4a.org/blog/fed-sharing/nespin-corporation.png" alt="NESPIN business registration" width="700" class="collapsible">
<img src="https://footnote4a.org/blog/fed-sharing/mocic-corporation.png" alt="MOCIC business registration" width="700" class="collapsible">
<img src="https://footnote4a.org/blog/fed-sharing/rocic-corporation.png" alt="ROCIC business registration" width="700" class="collapsible">
<img src="https://footnote4a.org/blog/fed-sharing/rmin-corporation.png" alt="RMIN business registration" width="700" class="collapsible">
<img src="https://footnote4a.org/blog/fed-sharing/magloclen-corporation.png" alt="MAGLOCLEN business registration" width="400" class="collapsible"></p>
<p>The federated RISS centers exist for a single purpose: to “facilitate information sharing.”</p>
<p>Because the data are ostensibly owned by government agencies, they are public records. That means
RISS centers are not in any way restricted by copyright law<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup>, and don’t require a
licensing agreement with Flock. Because the corporations are private, there is no effective
oversight.</p>
<p>These partnerships obliterate Flock’s defense that information sharing is a local decision.</p>
<p>Flock’s contradictory public statements are a smokescreen for the simple truth: by integrating with
a federally-funded, private network of information-sharing centers (RISS), local control remains an
illusion — data flows through Flock’s corporate partners to thousands of agencies at the local,
state, federal, and even international level.</p>
<p>As long as Flock does not actively prevent this type of information-laundering, the company’s
statements about data ownership, sharing control, and compliance with state law are entirely
meaningless.</p>
<p>This isn’t a local decision, a bug, or a rogue pilot program. It is a fundamental design feature —
one that Flock actively creates and supports.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>“The ALPR data may be shared only [after] [t]he request is reviewed by the Investigations
Division Commander or the authorized designee and approved before the request is fulfilled” <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>The sixth is WSIN (Western States Information Network®). It’s worth noting Flock does not
maintain consistent naming conventions. Let me know if you find WISN. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>Arguably, if ALPR data is factual information, copyright laws would not apply regardless. <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[Too Much, Too Late: A Digital Dragnet for a Homicide]]></title>
            <link>https://footnote4a.org/news/dupage-county</link>
            <guid isPermaLink="false">https://footnote4a.org/news/dupage-county</guid>
            <pubDate>Sat, 08 Nov 2025 21:01:00 GMT</pubDate>
            <description><![CDATA[How police used Flock's digital dragnet to investigate a homicide months after critical evidence was lost due to negligence.]]></description>
            <content:encoded><![CDATA[<p>On January 29, 2022, Wayne PD received a call from a resident reporting gunshots near his home on
Munger Road. Wayne police responded and found blood droplets in the snow, but nothing else. It
wasn’t until a more than a month later that a horse-rider discovered Frank’s body — he had been shot
11 times.</p>
<p><img src="https://footnote4a.org/blog/dupage/droplets.png" alt="Droplets in the snow" width="420" class="float-right ml-3"></p>
<p>On February 8, 2022, Metra Police was still investigating the case as a missing person. They saved
screenshots of the man when he appeared in footage captured at the Round Lake Metra Station on the
morning of January 29. They do not secure the footage.</p>
<p>When his body was finally discovered—not by police who were called to the location but by a random
passer-by—police pulled out all the stops to try to get evidence.</p>
<h2>The Events: As told by Cell Phones</h2>
<p>Although the ground had thawed, the case had frozen over. Much of the evidence that existed in
January was lost by March. The snow melted and took the blood that Wayne PD had ignored with it. The
video file Metra PD never bothered to save had long been overwritten. But Frank’s OnePlus cellphone
is still on him. Police obtain a search warrant at the same time they notify the family.</p>
<p>The family, who had already been looking for Frank, hand police a cloned phone, his Google password,
the name of a suspect—let’s call him Marco—and information about text messages that were suspicious
at best.</p>
<p><img src="https://footnote4a.org/blog/dupage/text-message1.png" alt="Text messages (1/2)" width="450">
<img src="https://footnote4a.org/blog/dupage/text-messages2.png" alt="Text messages (2/2)" width="450"></p>
<p>Frank’s mother had also received a Facebook message from another person, telling her that the people
Frank lived with know what happened. Police got a warrant for the sender’s Facebook account.</p>
<p><img src="https://footnote4a.org/blog/dupage/fb-messenger.png" alt="Facebook messenger" width="420" class="float-right ml-3"></p>
<p>Police then use the password and information provided by the family and determine that Frank was
part of a group that consisted of Frank, Marco, and brothers Sam and Albert.</p>
<p>Location records obtained through cell phone warrants show that on the morning of the 29<sup>th</sup>, Frank
took the train to Grayslake, spent some time there, and then took a bus to Marco’s house in Round
Lake Beach.</p>
<p>That same morning, phone records show, Rob and Sam traveled to Hammond, IN, on the Eastern edge of
Chicagoland, together.</p>
<p>Around lunchtime, Marco, Rob, and Sam meet up.</p>
<p>They spend some time in the Villa Park area. Sam then travels to Hammond and back while Marco and
Rob stay in Villa Park. A few hours later, around 3pm, Sam leaves Villa Park again and returns to
his home in Round Lake Beach.</p>
<p>That evening, around 7:30pm, Rob and Marco leave Villa Park to go to Marco’s home in Round Lake
Beach. On their way out, they stop at a gas station and meet with a man, Eric. Shortly after they
get to Round Lake Beach, Frank, who lives a few blocks away, joins them at Marco’s.</p>
<p>Marco and Rob then drive to Sam’s home, briefly meet up with him, and return to Marco’s home. Frank
had stayed there the whole time.</p>
<p>All three then head to the Grand Victoria Casino in Elgin together, around 10pm on January 29<sup>th</sup>.
About an hour later, Wayne PD receives the phone call about multiple gunshots, roughly eight miles
from the casino.</p>
<p>Frank had been murdered.</p>
<h2>Evidence, Informants, and Raids</h2>
<p>When Wayne PD investigates, they decide not to pursue multiple gunshots and fresh blood trails.
Thirty-three days later, when Frank’s body is finally found, the casino and the city had already
recycled their virtual surveillance video tapes.</p>
<p>Over the next few days, police receive records from the search warrants, and the ATF submits six
casings (five .380 caliber and one .40 caliber) to its national database, suggesting that at least
two firearms were used.</p>
<p><img src="https://footnote4a.org/blog/dupage/nibn.png" alt="Casings found"></p>
<p>Two days after the body is discovered, Rob changes his Facebook profile picture to Santa Muerte, Our
Lady of Death, wearing a red sash, and imposed against a backdrop of AK-47s. The government has, at
times, argued Santa Muerte is “<a href="https://ks.fd.org/blog/2014/07/8407-defense-santa-muerte">a tool of the drug trade</a>,” but that seems an
oversimplification.</p>
<p>Praying to Santa Muerte for protection—including from legal trouble—is practiced in some Mexican
traditions, and there is some evidence that some gang members in the United States have picked up
this custom—or at least the Santa Muerte imagery.</p>
<p>Rob, Frank, and the others belonged to the Mexican Playboy Sureños (PBS/Sur 13) street gang.</p>
<p><img src="https://footnote4a.org/blog/dupage/santa-muerte.png" alt="Santa Muerte" width="400" class="float-right ml-3"></p>
<p>Meanwhile, police continue trawling for evidence beyond the name of the suspect that the family
provided. ALPR turns up nothing; with the exception of a Walgreens video showing Rob’s truck driving
by, and another business provides video showing some unidentifiable vehicles on the road where
Frank’s body was found, they find little.</p>
<p>By mid-March, police apply for a search warrant for all location data from every Android phone in a
two kilometer (1.25 miles) radius around the location where Frank’s body was found.</p>
<p>ASA Louis Nuckolls approved the warrant and Judge Mackay signed off on it. Google, however, resisted
it and called it overbroad. The company convinced police to narrow it to a much more reasonable 200
meters (~650 feet).</p>
<p>Google provided two phones with “obfuscated device IDs” within that narrowed 200m radius. Police
deemed them irrelevant because they were too far from the scene of the crime. They did not
investigate these devices further.</p>
<p><img src="https://footnote4a.org/blog/dupage/geofence-warrant.png" alt="Geofence warrant" width="700"></p>
<p>Sam was a top contact for both Marco and Rob and had talked to Frank 17 times in the month of
January. He was saved in Frank’s phone as “Ced.”</p>
<p>At this time, an anonymous informant tells police that Frank had been “beefing” with his fellow gang
members, and that PBS was responsible for Frank’s death. The informant said that a man known as
“Cedric” had ordered Frank killed. Another man, “Hammer,” had also been involved. He gave police a
street for “Hammer” — the same as Marco’s.</p>
<p><img src="https://footnote4a.org/blog/dupage/informant.png" alt="Informant interview" class="collapsible"></p>
<p>By March 31<sup>st</sup>, police serve pen register orders on the cell phone provider, and they start
live-tracking Rob and Marco’s phone locations.</p>
<p>On April 7, SWAT raids three addresses. At the first, they arrest Marco and seize Albert’s phone. At
the second, they arrest Rob and seize his truck.</p>
<p>At the third address, where Frank used to rent a room from Marco’s brother and his partner (who
shares a last name with Sam), they arrived at 5am, surrounded the home, and ordered the residents
outside. Inside, they find Sam’s elderly father, in a “urine-soaked bed.” The report does not note
whether the man’s non-verbal state and immobility was a result of the armed raid.</p>
<p><img src="https://footnote4a.org/blog/dupage/swat.png" alt="SWAT raid family home" width="600" class="float-right"></p>
<p>They interview Marco’s brother (who has a “conejo,” bunny tattoo to signify PBS/Sur 13 membership).
They also seize 11 electronic devices and 29 memory cards.</p>
<p>Since then, Marco has been in the DuPage County jail, pending trial.</p>
<p>In 2024, Rob was sentenced to nine years on unrelated drug charges. He does not appear to have been
charged or publicly identified in relation to this murder.</p>
<p>There are no reports that Albert or Sal have been arrested or charged.</p>
<p>Marco has a court date set for November 13, 2025.</p>
<hr>
<h2>A Trail Gone Cold, A Dragnet Too Late</h2>
<p>The story of this investigation is one of critical, early failures. On January 29, 2022, after a
resident reported gunshots, Wayne PD responded, found blood in the snow, and, per media reporting,
did nothing more. They did not return. They did not find Frank’s body, which lay just 20–30 feet
from the road.</p>
<p>This inaction continued when Frank’s family reported him missing. The family, not the police,
provided detectives with a cloned copy of Frank’s cellphone, his Google password, and the name of a
suspect, “Marco.” The family even pointed out the suspicious text messages they had found and
received.</p>
<p>Despite these critical leads, the file shows a pattern of neglect. On February 8, Metra PD found
footage of Frank at the Round Lake station. They saved only screenshots of Frank and allowed the
full video file to be overwritten and lost forever.</p>
<p>It wasn’t until a month later, when a random passer-by stumbled upon Frank’s body, that police began
an investigation in earnest.</p>
<p>By then, the case was cold. The blood trail was gone, melted with the snow. The virtual surveillance
tapes from the Grand Victoria Casino and nearby businesses — which digital forensics would later
prove were key locations — had been recycled.</p>
<p>Instead of “good old-fashioned police work”—like searching 30 feet from a blood trail—the state
relied on massive, retroactive digital dragnets. They served a geofence warrant for a two-kilometer
radius around the crime scene, covering nearly five square miles. It was an act so “overbroad” that
Google pushed back and convinced police to narrow the search to 200 meters. Even then, the warrant
yielded two “obfuscated device IDs” which police did not deem relevant.</p>
<p>This “too much, too late” approach defined the outcome. The digital information seems to evidence
Rob and Sam’s extensive involvement: they were with Frank all day, at the casino just before the
murder, and Rob’s phone traveled with Marco’s to the Munger Road area just after Frank’s phone went
silent. Despite this data, only Marco was charged.</p>
<p>According to media reporting, the prosecutor alleged at Marco’s arraignment that Marco called
“another gang member” immediately after the murder, around 11pm. The file indicates Marco made a
31-second phone call to his roommate Albert at 12:15am, from the Round Lake Beach area, shortly
before he arrived home.</p>
<p>However, the file, but not the reporting on the prosecutor’s statements, shows that <em>Rob</em> received a
six-second call from a number with a northern Illinois area code at 11:03pm, while Rob and Marco
were still in the area where Frank’s body was found. The number is identified in the investigative
file, but there is no mention of its owner, or of attempts to find its owner.</p>
<p><img src="https://footnote4a.org/blog/dupage/rob-phonecall.png" alt="Rob phone call" width="700"></p>
<p>The file also shows that there was extensive contact between a number police identify as possibly
belonging to Eric, the man from the gas station, in the hour leading up to the murder.</p>
<p>But not any time before or after.</p>
<p><img src="https://footnote4a.org/blog/dupage/cell-contact.png" alt="Contacts between Rob and possibly Sam" width="450" class="float-right ml-3"></p>
<p>Eric is unable to pick Marco, Rob, or Frank in a photo line-up. He is treated as a witness and is
not investigated further.</p>
<p>This investigative file doesn’t tell the story of an under-resourced police department; it tells the
story of a well-equipped multi-jurisdictional team of investigators that didn’t bother with a
missing persons investigation and let the evidence grow cold.</p>
<p>When they finally acted, their high-tech dragnet was an imperfect substitute, apparently leaving
them with a case against one man while the others implicated by the same data faced no charges, or
even, by all appearances, any thorough investigation.</p>
<p>Now, to be clear: the harms of mass surveillance notwithstanding, police have a moral duty to use
the technology available to them. They should not be faulted merely for <em>using</em> surveillance— in
fact, they should have used that capability to find Frank when he was first reported missing, when
it mattered most.</p>
<p>But what they <em>also</em> had a duty to do was look for Frank. First, when he was missing. Then, when
they found blood while Frank’s lifeless body was a mere twenty feet from the road.</p>
<p>The broad, long-term phone warrants, and especially the ~5 sq. mile search warrant, show that mass
surveillance can’t be left unchecked in the hands of police. These warrants need meaningful
oversight, not rubberstamping prosecutors and judges or the best moral judgment of multinational
corporations.</p>
<p>Mass surveillance is not a substitute for work. Frank’s family was left in the dark for thirty-three
days while police and others had video of him. While police found his blood. While they were within
mere feet of his dead body.</p>
<p>Marco now sits in jail while others go uninvestigated. “We got him.”</p>
<p>At the end of the day, surveillance technology may be a “force multiplier,” but this case shows that
force multiplying zero will always stay zero.</p>
<p><a href="dupage-county-2">How this story became public reveals an even deeper failure →</a></p>
<hr>
<p class="text-sm">A redacted copy of the file <a href="https://footnote4a.org/blog/dupage/DuPage-Redacted.pdf">is available for download here</a>. As
the original file was a single, unformatted blob (from being pasted into a single data field), the
version provided has been re-formatted for readability (e.g., restoring line breaks and lists) to
more closely match the original document’s structure.</p>
<p class="text-xs">Although this case has previously been reported on, and despite the original source file being
public, I chose to redact the file and use aliases in the article. Despite the obvious limitations
of this approach, it is an effort to mitigate any potential additional harm, while still
illuminating this ongoing problem with Flock and other unregulated surveillance technology.<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup></p>
<p class="text-xs">I first reached out to the DuPage County public defenders’ office, which is defending “Marco,” on
October 14, 2025. My call was returned on October 23, with a vague “I’ll look into it.” There is no
additional information as of November 8, and the source file remains online.</p>
<p class="text-xs">I reached out to “Rob”'s attorney around the same time in October. He did not return my call.</p>
<p class="text-xs">After receiving the file, the DuPage County Clerk of Court responded: “Case filings may be obtained
or viewed in the Clerk’s Office in person or online via <a href="http://dupagecircuitclerk.gov">dupagecircuitclerk.gov</a> using the i2File or
Attorney Access links” (Filings for this case are unavailable online).</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p>More data breach posts are in the works — they’ll be posted here or elsewhere soon. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[157 Pages of Evidence, 200 Jurisdictions, Zero Oversight]]></title>
            <link>https://footnote4a.org/news/dupage-county-2</link>
            <guid isPermaLink="false">https://footnote4a.org/news/dupage-county-2</guid>
            <pubDate>Sat, 08 Nov 2025 21:00:00 GMT</pubDate>
            <description><![CDATA[A 157-page murder investigation file with informant details leaked to 200 agencies via Flock's uncontrolled audit log system.]]></description>
            <content:encoded><![CDATA[<p>A 157-page active murder investigation file, complete with information about anonymous informants,
gang intelligence, and detailed information on people not under suspicion, has been floating around
the internet for six months.</p>
<p>How it got there is a story of systemic failure and negligence.</p>
<p>According to the Flock audit logs processed on this website, an officer, John Alipour (technically,
“J. Ali”), with the DuPage Forest Preserve PD shared the entire 157-page file with Flock by looking
for a license plate and pasting the file into the “Reason” field.</p>
<p>Flock’s system, which the company claims is “CJIS certified”<sup class="footnote-ref"><a href="#footnote1">[1]</a><a class="footnote-anchor" id="footnote-ref1"></a></sup>, saw no problem with a massive,
sensitive file being provided as a simple “Reason” for a search. At the time of writing, the median
length for search reasons is <a href="https://footnote4a.org/statistics">7 characters</a>, and 81% of Alipour’s agency’s reasons
<a href="https://footnote4a.org/pd/6192-dupage-county-forest-preserve-il-pd/stats">are a single word long</a>.</p>
<p>But the real problem is that Flock’s customers allow Flock to create audit log entries — which are
the customer’s files — without any oversight. Because the customer is a government, their files are
public records.</p>
<p>On receipt of the 157-page search reason, Flock’s system proceeded to automatically enter it into
200 of its customers’ public records.</p>
<p>It would be like if you made a Word document writeable for Flock and told Flock “okay, just write
everything your customers say in this file,” without giving anyone any further instructions. Except
instead of a Word document, it’s the Flock software’s “Insights” tab with audit logs.</p>
<p>This was not just one policeman’s error. It was a complete failure of infrastructure and oversight
that began with allowing Flock to handle data and create government records.</p>
<p>Compounding the problem is that Flock’s platform, apparently, has no technical safeguards to prevent
a 157-page investigative file from being uploaded into a single text field.<sup class="footnote-ref"><a href="#footnote2">[2]</a><a class="footnote-anchor" id="footnote-ref2"></a></sup></p>
<p>Yes, the officer’s act was a gross violation of security policies, and, likely, law<sup class="footnote-ref"><a href="#footnote3">[3]</a><a class="footnote-anchor" id="footnote-ref3"></a></sup><sup class="footnote-ref"><a href="#footnote4">[4]</a><a class="footnote-anchor" id="footnote-ref4"></a></sup><sup class="footnote-ref"><a href="#footnote5">[5]</a><a class="footnote-anchor" id="footnote-ref5"></a></sup><sup class="footnote-ref"><a href="#footnote6">[6]</a><a class="footnote-anchor" id="footnote-ref6"></a></sup>
and prosecutorial ethics<sup class="footnote-ref"><a href="#footnote7">[7]</a><a class="footnote-anchor" id="footnote-ref7"></a></sup>.</p>
<p>Yes, the releasing agency did not properly review and redact hundreds of thousands of log entries
before releasing them.</p>
<p>But the bigger picture is that this is a symptom of government’s continuing failure to perform
meaningful oversight of private-sector police and surveillance technology.</p>
<p>All of this was foreseeable.</p>
<p>But now, even if anyone had caught it sooner, the toothpaste is out of the tube.</p>
<p><a href="dupage-county">The file exposed a murder investigation that let its evidence melt with the snow →</a>.</p>
<hr>
<p class="text-xs">A redacted copy of the file <a href="https://footnote4a.org/blog/dupage/DuPage-Redacted.pdf">is available for download here</a>. As
the original file was a single, unformatted blob (from being pasted into a single data field), the
version provided has been re-formatted for readability (e.g., restoring line breaks and lists) to
more closely match the original document’s structure.</p>
<hr>
<div class="markdown-alert markdown-alert-note">
<p class="markdown-alert-title">Note</p>
<p><strong>February 2, 2026 Update:</strong> After receiving non-responses from the DuPage Co. public defender and
the DuPage Co. Clerk of Court, I sent a letter reporting the incident to the FBI, with copies to
the US DoJ Office of the Inspector General, Senator Chuck Grassley (R-IA), and Illinois Attorney
General Kwame Raoul. Today, two months later, I received a response to that letter.</p>
</div>
<p>@<a href="https://footnote4a.org/blog/dupage-county-2/il-ag-response.pdf" class="collapsible">IL AG response to leaked investigative notes</a></p>
<blockquote>
<p>Thank you for your recent letter regarding the above-named business [Flock].</p>
<p>We wish to express our appreciation for your cooperation in bringing this matter to our attention.
and we have recorded the information that you have provided in our complaint files for possible
future use in enforcing Illinois’ consumer protection laws. It is only through the assistance of
concerned citizens that we can effectively do our job of enforcing Illinois’ consumer protection
laws.</p>
</blockquote>
<p>The person named in the file remains in the DuPage county jail, held on a $1M bond and awaiting
trial for murder.</p>
<hr class="footnotes-sep">
<section class="footnotes">
<ol class="footnotes-list">
<li id="footnote1" class="footnote-item"><p><em>“To demonstrate its commitment to security, [Flock] earned the CJIS ACE Compliance Seal by
partnering with Diverse Computing, a third-party service provider.”</em> Diverse Computing is a
private corporation out of Tallahassee, Florida. <a href="#footnote-ref1" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote2" class="footnote-item"><p>This 0-budget, 1-developer website, for example, has constraints on the amount of information
shown, and it has simple but largely effective filters to
<a href="https://footnote4a.org/about/privacy">redact SSNs, names, birthdates, etc.</a>. Even though those elements shouldn’t be
in the dataset to begin with. <a href="#footnote-ref2" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote3" class="footnote-item"><p>725 Ill. Comp. Stat. 120/4.5 (enumerating statutory rights for crime victims and witnesses,
including the right to be free from harassment and intimidation) <a href="#footnote-ref3" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote4" class="footnote-item"><p>5 Ill. Comp. Stat. 140/7(1)(d) (exempting from public disclosure under the Freedom of
Information Act any records that would “endanger the life or physical safety of any person”) <a href="#footnote-ref4" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote5" class="footnote-item"><p>5 Ill. Comp. Stat. 140/7(1)(c) (exempting FOIA records that would constitute a “clearly
unwarranted invasion of personal privacy”), <a href="#footnote-ref5" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote6" class="footnote-item"><p>5 Ill. Comp. Stat. 140/2(c-5) (defining “private information” protected from disclosure to
include personal addresses and telephone numbers). <a href="#footnote-ref6" class="footnote-backref">↩︎</a></p>
</li>
<li id="footnote7" class="footnote-item"><p>Ill. R. Pro. Conduct 3.8(b) (requiring a prosecutor to “exercise reasonable care to prevent”
police officers from making public statements that the prosecutor would be prohibited from
making under Rule 3.6). <a href="#footnote-ref7" class="footnote-backref">↩︎</a></p>
</li>
</ol>
</section>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
        <item>
            <title><![CDATA[The Many Faces of Flock Permits]]></title>
            <link>https://footnote4a.org/news/dot-permits</link>
            <guid isPermaLink="false">https://footnote4a.org/news/dot-permits</guid>
            <pubDate>Tue, 04 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Iowa DOT has a permitting process for roadside equipment. Kind of.]]></description>
            <content:encoded><![CDATA[<p>The State of Iowa owns 8,896 miles of roadways. These miles are managed by the Iowa Department of
Transportation. As is typical, the DOT sets rules for what can and can’t be constructed on the side
of the road, and it has a permitting process in place to ensure that whatever is built there
conforms to rigorous safety standards.</p>
<p>For most of us anyway.</p>
<h2>Rules for the Rest of Us</h2>
<p>The Iowa DOT publishes a <a href="https://iowadot.gov/media/215/download?inline">Design Manual</a> that covers
construction in the state right-of-way.</p>
<p>In it, you’ll find such statements as:</p>
<blockquote>
The Right of Way Design Section’s basic purpose is to produce and maintain a set of right
of way plans for a project that are accurate, legible, clear and concise so as to be
understood by landowners and Department personnel alike.
</blockquote>
<p>The DOT also operates a
<a href="https://iowadot.gov/consultants-contractors/right-way/utility-accommodation-coordination">utility accommodation program</a>,
which the DOT helpfully describes as “the process that occurs when utilities are placed within the
highway rights-of-way.”</p>
<p>The DOT operates an <a href="https://eps.iowadot.gov/">online utility permitting system</a> and publishes a
handbook that contains statements like:</p>
<blockquote>
115.15(7) Engineering. The utility owner is to retain the services of a licensed, professional
engineer familiar with the requirements for utility work to be accomplished in Iowa.
</blockquote>
<p>Then there are 511 forms for lane closures, requirements about insurance, traffic restrictions,
MUTCD compliance, MASH ratings, engineering standards, and various other things that are far beyond
this simple poster’s paygrade.</p>
<h2>Aren’t we all engineers when you think about it?</h2>
<p>With that in mind, I present the site plan submitted to, and approved by, the Iowa DOT for
<a href="https://footnote4a.org/blog/dot-permits/IA%20150%20Major%20Rd%20Fayette%20County.pdf">Project Number FN-150-6(3)–21-33</a>.</p>
<p><img src="https://footnote4a.org/blog/dot-permits/Fayette-Co-Plan.png" alt="Highway 150 site plan"></p>
<p>Deputy Sergeant Schveiger, who I assume is a licensed, professional engineer, assures us in the
permit that the “wooden 18 ft breakaway pole” will be “put into the ground” behind the guardrail and
that the Flock device will be “place on top of [the] pole approximately 11–12 ft in the air with
two metal bands.”</p>
<p>Further, from Engineer/Sergeant Schveiger’s drawing, it is plainly visible that the pole is to be
placed <em>directly</em> behind the guard rail and inside the guardrail’s deflection zone, where the
“ground” is made of concrete.</p>
<p>A wooden breakaway pole is uncommon for equipment. Typically, those are smaller posts, used for
signs. Equipment, including ALPRs, is typically placed on MASH-rated aluminum or composite poles,
which Flock can helpfully provide — for a fee.</p>
<p>Due to its height, the proposed 18 foot wooden pole cannot be both a breakaway pole and support any
sort of equipment. Now, without giving the DOT a pass for approving the permit, I’ll give
Engineer/Sergeant Schveiger the benefit of the doubt and assume that “18 foot” is a typo. The main
question — whether the pole is MASH-rated — remains unanswered.</p>
<p>However, that question does not matter. Even if it were a breakaway pole, by placing it directly
behind a guardrail, that guardrail is turned from a shock-absorbing, protective barrier, engineered
to deflect several feet and absorb the energy of a crashing vehicle, into a rigid wall.</p>
<p>The application was approved by the county. Not the county engineer or anyone whose position would
give them insight on traffic engineering. Nor anyone with at least an appearance of neutrality.
Instead, it was approved by Fayette County Sheriff Marty Fisher.</p>
<p>Then
<a href="https://iowadot.gov/contacts/nicholas-sorenson-engineering-operations-technician-new-hampton">Nick Sorenson</a>,
the DOT’s “Engineering Operations Technician,” approved this death trap, based on the permit
submitted — Microsoft Paint and all.</p>
<p>And it only gets worse from here.</p>
<h2>All Roads Are Basically the Same, Right?</h2>
<p>Different cities and different DOT districts take different approaches. Some submit one-liners on
handwritten forms, others forward the more extensive Flock-produced plans that don’t follow DOT
standards. The only thing they have in common is that the DOT approves them all.</p>
<p>Council Bluffs keeps it short and sweet in
<a href="https://footnote4a.org/blog/dot-permits/PW_ADMIN_4070N@councilbluffs-ia.gov_20230117_151641.pdf">its permit application</a>:</p>
<blockquote>
Installation of a Flock Safety license plate reader camera system with pole
</blockquote>
<p>That’s it.</p>
<p><img src="https://footnote4a.org/blog/dot-permits/Council-Bluffs-Permit.png" alt="Council Bluffs Permit Application" class="collapsible"></p>
<p><a href="https://footnote4a.org/blog/dot-permits/CarlislePD.pdf">Carlisle’s permit</a> goes into slightly more detail than Council
Bluffs’, and, to Carlisle’s credit, it even mentions they will be using a (MASH-rated, breakaway)
Redi Torque assembly.</p>
<blockquote>
Installation of 2 ALPR cameras in DOT ROW installed (2) or X2 Redi Torque - Soil Plate and solar
powered on behalf or Carlisle PD
...
Falcon 2.2 - 16 mm - Verizon CAT 4 (7611) 65W Solar Panel cameras installed on behalf of Carlisle PD
</blockquote>
<p>Unfortunately, despite the technobabble, just like in Council Bluffs, the permit does not identify
<em>where</em> the devices are to be installed.</p>
<p>Gary Kretlow Jr., Iowa DOT’s Engineering Technician Senior, approved it anyway.</p>
<p>After all, all roads are basically the same, right?</p>
<h2>White Lies and Permit Applications</h2>
<p>In an entirely unnecessary move, Storm Lake, home of Tyson Foods and its many immigrant laborers,
takes it a step further and decides to lie on its permit application. Why not?</p>
<blockquote>
Cameras will be managed according to the restrictions of the devices. All replacement or maintenance
of the devices and their supporting structures will be the responsibility of the Storm Lake Police
Department.
</blockquote>
<p>Storm Lake is, in fact, the only party
<a href="https://www.flocksafety.com/legal/terms-and-conditions">contractually prohibited</a> from replacing or
maintaining “the devices and their supporting structures”:</p>
<blockquote>
Customer is not permitted to remove, reposition, re-install, tamper with, alter, adjust or otherwise
take possession or control of Flock Hardware. Customer agrees and understands that in the event
Customer is found to engage in any of the foregoing restricted actions, all warranties herein shall
be null and void, and this Agreement shall be subject to immediate termination for material breach
by Customer.
</blockquote>
<p>“But,” I hear you say, “they can still be responsible without doing the work themselves!”</p>
<p>That would typically be true. Except the contractual prohibition on, basically, touching the device
is exacerbated by the fact that Flock is under no obligation to maintain or fix it.</p>
<blockquote>
Flock shall use reasonable efforts consistent with prevailing industry standards to maintain the
Services in a manner which minimizes errors and interruptions in the Services
...
In the event that Flock Hardware is lost, stolen, or damaged, Customer may request a replacement of
Flock Hardware at a fee according to the <a href="https://www.flocksafety.com/reinstall-fee-schedule">
reinstall fee schedule</a>.
<p>In the event that Customer chooses not to replace lost, damaged, or stolen Flock Hardware, Customer
understands and agrees that Flock is not liable for any resulting impact to Flock Service, nor shall
Customer receive a refund for the lost, damaged, or stolen Flock Hardware.</p>
</blockquote>
<h2>A Process for Some, a Rubber Stamp for Others</h2>
<p>The Iowa DOT’s robust permitting process, with its reams of engineering standards, safety manuals,
and requirements for licensed professionals, is a façade.</p>
<p>The evidence shows a two-tiered system. For the public and legitimate utilities, there are rules.
For police agencies, there are approvals.</p>
<p>If you are a utility, you must hire an engineer. If you’re with the sheriff’s office, you can use MS
Paint on a Google Maps screenshot and call it a site plan. The DOT will approve it.</p>
<p>The department will approve dangerously incomplete applications that fail to state where the
equipment will even be installed. It will approve applications containing obvious, verifiable
falsehoods about maintenance and liability. And it will sign off on plans that turn engineered
safety barriers into rigid, vehicle-impaling deathtraps.</p>
<p>Just as police are not keeping us safe with mass surveillance, the DOT is not ensuring safety with
mass approvals of equipment in the right-of-way. It abandons its most basic public duty in favor of
providing a fast lane for surveillance, one dangerously stupid permit at a time.
a time.</p>
]]></content:encoded>
            <author>hcvp@haveibeenflocked.com (H.C. van Pelt)</author>
            <category>editorial</category>
            <category>investigations</category>
        </item>
    </channel>
</rss>