logoalt Hacker News

dvtkrlbsyesterday at 4:59 PM4 repliesview on HN

Yes and the biggest problem with this kind of ALPRs are they bypass the due process. Most of the time police can just pull up data without any warrant and there has been instances where this was abused (I think some cops used this for stalking their exes [1]) and also the most worrying Flock seems to really okay with giving ICE unlimited access to this data [2] [3] (which I speculate for loose regulations).

[1]: https://lookout.co/georgia-police-chief-arrested-for-using-f... [2]: https://www.404media.co/emails-reveal-the-casual-surveillanc... [3]: https://www.404media.co/ice-taps-into-nationwide-ai-enabled-...


Replies

tdecktoday at 1:33 AM

I'm sure the 40 percent of cops who are domestic abusers and the white supremacists militias recruited wholesale into ICE will use this power responsibly.

show 1 reply
throwway120385yesterday at 5:39 PM

When you give access to any system that collects the personal information including location data for people in the US to the police, a percentage of the police will always use those systems for stalking their exes.

show 2 replies
quitityesterday at 11:49 PM

I keep an unofficial record of instances where police and similar authorities have abused their access to these types of systems. The list is long. It's almost exclusively men stalking ex-partners or attractive women they don't know, but have seen in public.

What's frightening is it's not rare, it actually happens constantly, and this is just within the systems which have a high level of internal logging/user-tracking.

So now with Flock and data brokers we have authorities having access to information that was originally held behind a judge's signature. Often with little oversight, and frequently for unofficial, abusive purposes.

This reality also ties back to the discussion about providing the "good guys" encryption backdoors. The reality is that there are no "good guys", everyone exists in shades of grey, and I dare say there are people in forces whom are attracted to the power the role provides, rather than any desire for public service.

In conclusion it's a fundamental design flaw to rely on the operator being a "good guy", and that's before we get into the problem of leaks, bugs, and flaws in the security model, or in this case: complete open access to the public web - laughable, farcical, and horrifying.

show 3 replies
candiddevmikeyesterday at 10:52 PM

Maybe with these systems we should require them TO be open for anyone to query against. Maybe then people would care more about how they impact their privacy.

show 2 replies