this post was submitted on 27 Jan 2026
378 points (99.5% liked)

Technology

79879 readers
2616 users here now

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related news or articles.
  3. Be excellent to each other!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
  9. Check for duplicates before posting, duplicates may be removed
  10. Accounts 7 days and younger will have their posts automatically removed.

Approved Bots


founded 2 years ago
MODERATORS
 

Police officers are being told to “be as vague as permissible” about why they are using the Flock surveillance system in order to not leak sensitive information via public records requests, according to records obtained using a public records request. The warning originated from a Houston-area police intelligence center that includes members of the FBI and ICE and suggests without evidence that people are using a website called HaveIBeenFlocked.com to “potentially retaliate against law enforcement.”

The warnings were shared with 404 Media by researchers from Southerners Against Surveillance Systems and Infrastructure and Lucy Parsons Lab after our article about police unwittingly leaking the details of millions of surveillance targets nationwide due to public records redaction errors made by several Flock automated license plate reader system customers. This data was aggregated into a searchable tool called HaveIBeenFlocked.

Rather than looking at this incident as a huge operational security failure associated with using a massive commercial surveillance system, police see this as something that puts their officers directly in harm’s way. The data released by police departments includes the agency doing a search, the officer’s name, time of search, the license plate searched, and a “reason” field, which is the justification for doing a specific search.

Archive: http://archive.today/DtKt4

top 17 comments
sorted by: hot top controversial new old
[–] PriorityMotif@lemmy.world 63 points 5 days ago (2 children)

They live in their own paranoid delusional world where everyone is out to get them and they are the heroes between bad and good.

[–] surewhynotlem@lemmy.world 9 points 5 days ago

ThE tHiN BlUe LiNe

[–] captainlezbian@lemmy.world 2 points 4 days ago

That's what the police training has been teaching them to do. Learning about it was extremely scary, because seriously why the fuck would you teach cops of all fucking people to shoot at the first twinge of fear and that everyone is out to get them!

[–] thejml@sh.itjust.works 38 points 5 days ago

Rather than looking at this incident as a huge operational security failure associated with using a massive commercial surveillance system, police see this as something that puts their officers directly in harm’s way.

Why not both?

[–] Maeve@kbin.earth 16 points 5 days ago (1 children)
[–] Tikiporch@lemmy.world 24 points 5 days ago (5 children)

There's one of those right outside my neighborhood, and I'm not sure what to do with it.

[–] KairuByte@lemmy.dbzer0.com 30 points 5 days ago (1 children)

Not much within the legal window. Maybe petition for its removal.

Unrelated, but I believe an axe and a mask usually work pretty well on most electronic devices. Driving out of town, walking back in on a non flock path, ensuring you have a “limp” as well as non descriptive/logoless clothes, and ensuring you have no devices on you, are all great general opsec tips as well.

[–] adespoton@lemmy.ca 19 points 5 days ago* (last edited 5 days ago)

In other places, people have done all sorts of legal things in front of ALPRs, from presenting them with a steady stream of license plate photos of law enforcement vehicles from out of state, to putting on plays, dance performances and other forms of entertainment in front of them and then submitting FOIA requests for the footage since they’re being consumed (indirectly) by the government. In states that have actual privacy laws, people are requesting all information Flock has on them from the company in order to verify that it is accurate. In some places, they can even require removal.

[–] NarrativeBear@lemmy.world 13 points 5 days ago

People in my neighborhood constantly cut speed cameras down every other week, do with this as you will.

[–] Passerby6497@lemmy.world 6 points 5 days ago

I bet it's not too hard to cover it in paintballs or find a way to make it fall off a pole

[–] hector@lemmy.today 5 points 5 days ago (3 children)

I wonder if lasers ruin them like older cameras?

[–] EchoCranium@lemmy.zip 6 points 4 days ago

Infrared lasers used in lidar systems will damage phone cameras, so likely will fry surveillance cameras as well. You can buy 1550nm lasers used as illuminators for night vision systems. Probably want a Class 2 or 3.

https://www.techeblog.com/lidar-smartphone-camera-sensor-damage/

[–] surewhynotlem@lemmy.world 7 points 5 days ago

If you get a big enough laser, anything is possible.

[–] Pat_Riot@lemmy.today 3 points 5 days ago (1 children)

Bullet through the battery should be pretty effective. Surely they are lithium batteries. They catch fire if they get a hole in 'em.

[–] hector@lemmy.today 5 points 5 days ago

I was just thinking the laser thing could be something they may not be able to identify the cause of, a bullet they would know someone shot it. Which is probably ok if you are smart about doing one, but if you want to do all of them, something sneaky would be better.

[–] Pat_Riot@lemmy.today 3 points 5 days ago

Have you seen Cool Hand Luke?