A couple months ago, YouTuber Benn Jordan "found vulnerabilities in some of Flock's license plate reader cameras," reports 404 Media's Jason Koebler. "He reached out to me to tell me he had learned that some of Flock's Condor cameras were left live-streaming to the open internet."
This led to a remarkable article where Koebler confirmed the breach by visiting a Flock surveillance camera mounted on a California traffic signal. ("On my phone, I am watching myself in real time as the camera records and livestreams me — without any password or login — to the open internet... Hundreds of miles away, my colleagues are remotely watching me too through the exposed feed.")
Flock left livestreams and administrator control panels for at least 60 of its AI-enabled Condor cameras around the country exposed to the open internet, where anyone could watch them, download 30 days worth of video archive, and change settings, see log files, and run diagnostics. Unlike many of Flock's cameras, which are designed to capture license plates as people drive by, Flock's Condor cameras are pan-tilt-zoom (PTZ) cameras designed to record and track people, not vehicles. Condor cameras can be set to automatically zoom in on people's faces... The exposure was initially discovered by YouTuber and technologist Benn Jordan and was shared with security researcher Jon "GainSec" Gaines, who recently found numerous vulnerabilities in several other models of Flock's automated license plate reader (ALPR) cameras.
Jordan appeared this week as a guest on Koebler's own YouTube channel, while Jordan released a video of his own about the experience. titled "We Hacked Flock Safety Cameras in under 30 Seconds." (Thanks to Slashdot reader beadon for sharing the link.) But together Jordan and 404 Media also created another video three weeks ago titled "The Flock Camera Leak is Like Netflix for Stalkers" which includes footage he says was "completely accessible at the time Flock Safety was telling cities that the devices are secure after they're deployed."
The video decries cities "too lazy to conduct their own security audit or research the efficacy versus risk," but also calls weak security "an industry-wide problem." Jordan explains in the video how he "very easily found the administration interfaces for dozens of Flock safety cameras..." — but also what happened next:
None of the data or video footage was encrypted. There was no username or password required. These were all completely public-facing, for the world to see.... Making any modification to the cameras is illegal, so I didn't do this. But I had the ability to delete any of the video footage or evidence by simply pressing a button. I could see the paths where all of the evidence files were located on the file system...
During and after the process of
conducting that research and making that
video, I was visited by the police and
had what I believed to be private
investigators outside my home
photographing me and my property and
bothering my neighbors. John Gaines or
GainSec, the brains behind most of this
research, lost employment within 48
hours of the video being released. And
the sad reality is that I don't view
these things as consequences or
punishment for researching security
vulnerabilities. I view these as
consequences and punishment for doing it
ethically and transparently.
I've been
contacted by people on or communicating
with civic councils who found my videos
concerning, and they shared Flock
Safety's response with me. The company
claimed that the devices in my video did
not reflect the security standards of
the ones being publicly deployed. The
CEO even posted on LinkedIn and boasted
about Flock Safety's security policies.
So, I formally and publicly offered to
personally fund security research into
Flock Safety's deployed ecosystem. But
the law prevents me from touching their
live devices. So, all I needed was their
permission so I wouldn't get arrested.
And I was even willing to let them
supervise this research.
I got no
response.
So instead, he read Flock's official response to a security/surveillance industry research group — while standing in front of one of their security cameras, streaming his reading to the public internet.
"Might as well. It's my tax dollars that paid for it."
" 'Flock is committed to continuously improving security...'"
[ Read more of this story ](
https://yro.slashdot.org/story/26/01/17/0718211/what-happened-after-security-researchers-found-60-flock-cameras-livestreaming-to-the-internet?utm_source=atom1.0moreanon&utm_medium=feed ) at Slashdot.