Flock Exposed Its AI-Powered Cameras to the Internet. We Tracked Ourselves

Security failures and AI escalation

  • Commenters see the exposed Flock cameras as more than a simple “misconfiguration”: basic auth, default security, and QC appear worse than consumer ISP routers or cheap IP cams.
  • Corporate incentives (cutting support costs, minimizing friction for installers) are blamed for shipping devices with no meaningful security.
  • The new AI/auto‑PTZ features are viewed as a qualitative shift: instead of a passive feed you must watch, the system actively detects motion, zooms on faces/plates, and tracks targets—turning an open camera into a real‑time stalking and reconnaissance tool.
  • Some contrast this with older Shodan‑indexed cameras and ALPRs: the novelty isn’t cameras on the internet, but AI‑driven targeting plus central search.

Surveillance, power, and recurring abuse

  • Many argue the core problem is the existence of mass, persistent ALPR/surveillance networks at all—not just who can currently access them.
  • Numerous anecdotes and links describe police repeatedly abusing database access to stalk ex‑partners or random women; similar patterns are reported in multiple countries and even intelligence agencies.
  • Commenters note cooperation with immigration enforcement and cross‑jurisdiction sharing (e.g., abortion tracking, ICE access), calling this a nationwide dragnet with weak RBAC and oversight.
  • Some emphasize that surveillance historically was constrained by manpower; AI removes that limit, enabling cheap, total monitoring.

Legal and constitutional angles

  • There is debate over “no expectation of privacy in public”: some say this makes ALPR legal; others cite newer precedents suggesting mass, long‑term location tracking may implicate Fourth Amendment protections.
  • Several stress that stalking and targeted misuse are illegal, but legal regimes treat large‑scale corporate/state data collection differently from individual behavior.
  • One concern is that Bill of Rights protections intended to restrain government are being inverted to justify government‑ and corporate‑run surveillance.

Public access vs exclusive access

  • A minority argue that if such systems must exist, making feeds public could diffuse power, increase awareness, and deter deployment (e.g., when courts deem data public records, cities remove cameras).
  • Critics respond that open feeds radically increase stalking, doxxing, and commercial tracking, shifting power from local individuals to distant actors with compute and storage.

Flock, investors, and “Surveillance Valley”

  • Flock is portrayed as emblematic of venture‑funded surveillance capitalism: aggressive growth goals, dense coverage in some cities, and close alignment with law enforcement.
  • YC and major VCs’ backing—and public defenses from startup figures—are heavily criticized as prioritizing profit and “law and order” optics over civil liberties.
  • Some note ALPR adoption would likely continue even without Flock; others say Flock’s branding, lobbying, and ambition to “blanket” cities make it a natural focal point for pushback.

Proposed responses and pessimism

  • Suggested responses include municipal bans or strict ordinances, using tools like deflock.me and alpr.watch to organize locally, litigation against vendors, and public‑records tactics that make deployments politically toxic.
  • Others mention more direct (and illegal) tactics like vandalizing cameras, arguing the repair burden is asymmetric.
  • Many are pessimistic, comparing this to TSA: an intrusive system normalized over decades, where outrage fades and infrastructure persists.