EFF Discovers More Leaky ALPR Cameras Accessible Via The Web

from the more-cameras,-less-security dept

Not only are automatic license plate readers (ALPRs) in use all over the nation, but the companies behind them are less interested in securing their systems than selling their systems.

Earlier this year, EFF learned that more than a hundred ALPR cameras were exposed online, often with totally open Web pages accessible by anyone with a browser. In five cases, we were able to track the cameras to their sources: St. Tammany Parish Sheriff’s Office, Jefferson Parish Sheriff’s Office, and the Kenner Police in Louisiana; Hialeah Police Department in Florida; and the University of Southern California’s public safety department. These cases are very similar, but unrelated to, major vulnerabilities in Boston’s ALPR network uncovered in September by DigBoston and the Boston Institute for Nonprofit Journalism.

The earlier investigative work mentioned by the EFF has been spearheaded by Kenneth Lipp, who has exposed several insecure camera systems run by private contractors but deployed by government agencies. Lipp has also uncovered unsecured law enforcement CCTV systems in other major cities, including New York’s Domain Awareness System, where feeds could be easily accessed via the internet.

The systems the EFF accessed are sold and maintained by PIPS Technology. The EFF was able to access several stationary ALPR cameras and view live captures of plate data.

The company, now owned by 3M, offered this statement when notified of the security hole.

We cannot comment on issues PIPS may have had prior to the acquisition, but I can tell you any issues with our products are taken very seriously and directly addressed with the customer.

We stand behind the security features of our cameras. 3M’s ALPR cameras have inherent security measures, which must be enabled, such as password protection for the serial, Telnet and web interfaces. These security features are clearly explained in our packaging.

Except, of course, the EFF’s discoveries came after 3M’s acquisition of PIPS. While the holes the EFF uncovered have been closed, 3M (and other companies) have pretty much declared unsecured ALPR cameras to be Not Their Fault. Over the years, researchers and activists (like Dan Tentler) have received a variety of deflections from ALPR companies.

3M spokeswoman Jacqueline Berry noted that Autoplate’s systems feature robust security protocols, including password protection and encryption. They just have to be used.

“We’re very confident in the security of our systems,” she said.

That would mean something if the companies simply sold the software and hardware. But the companies also have direct access to client connections and should be able to check for unprotected sources. But they don’t and when confronted, they blame the end user. When Kenneth Lipp went public with his discoveries, he received this answer from Genetec, which ran the systems he was able to access.

On the ALPR front, Genetec shirks all responsibility for the aforementioned open portal, even though a remote desktop client terminal, which was also left exposed, shows they had direct access. Reached by email for this story, the company’s Vice President of Marketing and Product Management Andrew Elvish wrote that the server in question was a “location used by a customer to transfer data to be used in a parking or law enforcement patrol car, equipped with a Genetec system.” The data, Elvish added, was “not gathered by a Genetec AutoVu ALPR system … [which is] automatically encrypted.”

As far as the contractors are concerned, the problem is law enforcement agencies who are deploying the cameras and systems without implementing built-in security features. And while the agencies involved quickly closed the security holes, it doesn’t change the fact that these systems went live while they were still unsecured. This could be chalked up to carelessness, but it could also be another indication of how little most agencies (and the companies who sell to them) care about the millions of people who aren’t cops/government contractors. In their minds, the important thing is that the systems went live and started contributing to vast plate/location databases. Properly securing systems is still an afterthought.

Filed Under: , ,
Companies: 3m, eff, pips

Rate this comment as insightful
Rate this comment as funny
You have rated this comment as insightful
You have rated this comment as funny
Flag this comment as abusive/trolling/spam
You have flagged this comment
The first word has already been claimed
The last word has already been claimed
Insightful Lightbulb icon Funny Laughing icon Abusive/trolling/spam Flag icon Insightful badge Lightbulb icon Funny badge Laughing icon Comments icon

Comments on “EFF Discovers More Leaky ALPR Cameras Accessible Via The Web”

Subscribe: RSS Leave a comment
42 Comments
Anonymous Coward says:

Re: Re:

While crappy security is a concern in itself, I really don’t care too much about individual camera feeds being exposed.

My problem is with the security of the databases that are storing the data long-term (both exposing it to the public and storing it in the first place). As the density of ALPRs increases, the records effectively become as detailed as GPS data would be. It’s like the police putting a GPS tracker on every single car in their city.

Anonymous Coward says:

Re: Re: Re: Re:

And this is why I just go for the ‘don’t do it at all’ solution. With public records of everyone’s exact driving routes, speeds, and stops:

Health insurance co.: ‘You stop at McDonalds way to often. We’re raising your rates, Cholesterol Boy’.

Boss: ‘You stop at McDrunkies Bar for way too long, way too often. You’re fired, Scotch Boy’.

Police: We know your general pattern of stopping at the ATM. This means you have cash on you. All cash could be used to buy drugs, so we’ll need to keep seizing it, Enyone Boy’.

Anonymous Coward says:

Public access for public readers

All ALPRs that can readily be exposed to the public (i.e. they are already connected to the Internet for their administrators’ convenience) ought to be exposed and accessible anonymously. People never appreciate a threat to privacy until they see how it impacts them personally. The potential abuses are much easier to understand when you can tell them “That camera sees when you leave, and anyone with an Internet connection can see it too. If you don’t like it, get your city council to rein in surveillance.”

Anonymous Coward says:

Around here the cops are always driving through shopping center parking lots with license plate readers, and slapping wheel clamps on cars which presumably have unpaid tickets of some kind. Since cars are not even required to have license plates while on private property, it’s a wonder why these people don’t just remove their plates while they spend the day at the mall.

Hopefully cars in the near future will come with quick-change licence plate holders, or covers, so at least parked cars will be safe from getting scanned.

Anonymous Coward says:

Re: Re: Re:3 Smart-glass license plate

Damn, it doesn’t even look challenging enough to be fun, using something like this. Only minor challenge might be getting the right amount of juice to the film at the right time. Has everybody else already been doing this for a while, and I’m just late to the party?

(http://shop.smarttint.com/Plug-and-Play-Smart-Tint-Systems–You-Trim-To-Fit_c_4767.html)

Uriel-238 (profile) says:

Taking a moment to blue-sky a radical notion...

What would happen if the next time some government spy database is hacked instead it just gets dumped to the public?

Say via peer-to-peer.

Somewhat hard on the victims, but maybe that might drive home that surveillance + lousy security is a maximum strength bad idea?

I mean, it’s post Ashley-Madison, why haven’t we learned this already?

Anonymous Coward says:

Re: Taking a moment to blue-sky a radical notion...

If the leaked data contains numerous license plate captures of public officials ( police chiefs, mayors, etc ) personal vehicles being parked at places of ill repute then yes I guarantee action will be taken to secure data from future hacks combined with a PR campaign explaining how the hacked data cannot be trusted and how most of it is fake.

If it only contains citizen data a hack will change nothing.

Anonymous Coward says:

Re: Re: Taking a moment to blue-sky a radical notion...

Why do I have the sneaking suspicion that very soon, government cars will be equipped with tiny transmitters that tell ALPRs to stop photographing while they’re in range. Hell, maybe all politicians will be able to get sub-dermal chips that tell all surveillance and security cameras to stop recording.

tqk (profile) says:

Re: Taking a moment to blue-sky a radical notion...

What would happen if the next time some government spy database is hacked instead it just gets dumped to the public?

That is punishing exactly the wrong people, the victims. However, if the data’s scrubbed of PII first, it might be effective and benign.

I mean, it’s post Ashley-Madison, why haven’t we learned this already?

They don’t have to. It took more than a decade for businesses I worked for to twig to the fact that telnet, ftp, and rsh transfer passwords in cleartext visible to any sniffer (wireshark) on the network, so they should stop using them. When we went to wifi over ethernet, it was a disastrous idea to continue using them, but they did anyway. I even had to warn a large Canadian university they were running finger (a stalker’s dream).

Lacking accountability, there is no liability, and no need to improve or even catch up, but don’t make the victims pay the price.

Anonymous Coward says:

How to stop this

Stopping this is easy:

1. Crowd fund software to recognize license plates
2. Purchase a few cameras
3. Find locals willing to have the cameras placed in their window facing the street.
4. Obtain, via observation, license plate numbers for various city officials
5. Publish time and location each time a public officials license plate is recognized
6. When they bitch about privacy feed them their own food of ‘but it happens in public so there is no expectation of privacy’ BS
7. Watch them agree to stop using their ALPR if we stop using our ALPR.

Oh who am I kidding, everyone involved in such an idea would be labeled a domestic terrorist and be prosecuted as such starting with me for suggesting such terrorism.

Geno0wl (profile) says:

Heads Up

Another fun tidbit PIPS/3M responded to the article from the EFF…and then didn’t bother to contact the contractors/agencies with the vulnerable cameras!
So while the article about the cameras came out on the 28th, and 3M responded to it…they never bothered to reach out and inform or help in any fashion the agencies that were vulnerable. So our agency didn’t get notified of potential issues until the 29th when this article was read online.
Thanks for nothing 3M.

Geno0wl (profile) says:

Re: Re: Heads Up

Funny thing, we DO pay for the service contract!
Now we are going back through and resetting all the camera passwords to what we want them to be…except for two of them. Why not two of them? Because apparently 3M set them different than the rest and “forgot” what they were set to!
And they are fighting us about resetting the password because it isn’t part of the “standard service contract”…yeah our person in charge of the contract is ready to flip their shit and has vowed to never buy another 3M product over this whole thing.

Andrew D. Todd (user link) says:

The Trains, As Well The Automobiles.

There was a curious story in this month’s Trains Magazine (Dec 2015).

To begin with, you may know that railroad cars have RFID tags of a sort, which are used to keep track of where the cars are, and to set the switches in sorting yards, and to allow track-side defect-detectors to point to particular cars. One funny story was that when a Barnum & Bailey circus train passed a detector, the machine detected something protruding from one of the cars, and rang an alarm. It turned out that one of the elephants had stuck his nose out for a bit of fresh air. The railroad tags are of very crude design, having been standardized at an early date. Each tag consists of twenty or so tuned oscillators (either RC or LC circuits, I don’t remember which), some of the oscillators being shorted out to produce a bit pattern. The system does not include any kind of encryption or anything.

Well, it seems that some mysterious strangers were caught installing a tag-reader along a main line in New Jersey. There was a certain amount of panic about how they must be terrorists, and all, but they eventually turned out to be working for an economics-research firm, which wanted inside information to bet on the oil-futures market. The reader had been installed on the railroad’s land, only twenty feet from the track center. A power cord ran to a nearby house, whose owner had been paid $500, one-time, for a lease by the economic-research firm. The men from the market-research firm probably misrepresented themselves to the householder as having official business. I imagine the twenty or so resonating frequencies are reserved, so a free-lance tag-reader, which needs to transmit those frequencies, is illegal on that ground, as well as the physical trespass.

Trains reproduced a picture of the locus in quo. There seems to be a backyard swing set about 50-100 further away from the track, and there’s no fence. Railroaders tend to have rather laxer standards about these kinds of things than the builders of interstate highways. At some remote date in the past, the railroad cut a slot in the hillside for the track, terminated with 45-degree embankments, and never felt compelled to do more than that,even when farms were replaced by subdivisions. There are some trees (one looks at least fifty years old), halfway up the embankment, leading to someone’s back yard. Railroads have been poor for a long time, and they’ve gotten used to being poor, and it simply doesn’t occur to them to do a lot of things which Techdirt readers might expect them to do.

Ticket Monster says:

Not that hard

I work in IT. We buy network hardware from a vendor, and they made a simple change a year or two ago. When you unpack the device and turn it on for the first time, it asks you to change all the default passwords. You still log in the first time with the default they set, but before you can do anything else, you must change the default login password. It is a simple change every vendor should make.

When you power up a blank device, force a password reset.

Leave a Reply to John Fenderson Cancel reply

Your email address will not be published. Required fields are marked *

Have a Techdirt Account? Sign in now. Want one? Register here

Comment Options:

Make this the or (get credits or sign in to see balance) what's this?

What's this?

Techdirt community members with Techdirt Credits can spotlight a comment as either the "First Word" or "Last Word" on a particular comment thread. Credits can be purchased at the Techdirt Insider Shop »

Follow Techdirt

Techdirt Daily Newsletter

Ctrl-Alt-Speech

A weekly news podcast from
Mike Masnick & Ben Whitelaw

Subscribe now to Ctrl-Alt-Speech »
Techdirt Deals
Techdirt Insider Discord
The latest chatter on the Techdirt Insider Discord channel...
Loading...