
Sign up to save your podcasts
Or


You can be tracked in the real world—without consent—just by driving down a public road.
And the scariest part isn’t “live tracking”… it’s rewind: searchable history after the fact.
In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer break down Automated License Plate Readers (ALPRs)—why they’re popping up everywhere, why they’re easy to miss, and why the data is more dangerous than the camera.
You’ll learn:
What ALPR cameras capture (it’s more than “just plates”)
How cheap hardware + open source + cloud storage made this inevitable
Why “30-day retention” isn’t the same as “safe” once data is exported/shared
The governance gap: private vendors, thousands of customers, inconsistent rules
The cybersecurity risk nobody talks about: downstream buyers and sloppy security
Practical steps you can take to demand limits and transparency
Media/interview: [email protected]
Audio: https://legitimatecybersecurity.podbean.com/
Chapters:
00:00 You’re being monitored outside (no consent)
00:45 What ALPR is (and why it’s a misnomer)
01:30 Why it got cheap: hardware + open source + cloud
04:10 The U.S. privacy gap (no single overarching law)
05:00 These aren’t red-light cameras—why you don’t notice them
06:45 Flock Safety + the business of surveillance
08:20 “Vehicle fingerprinting” (tracking without “just plates”)
10:00 Who’s buying it: cities, states, feds… and HOAs
11:15 Data retention: policy vs reality (purge vs sanitize vs export)
13:45 Commercial surveillance = “fog” (hard to see, harder to fight)
14:40 Outsourcing “security” (the Pinkertons comparison)
17:10 Governance: why oversight breaks across customers/jurisdictions
18:30 The Wi-Fi packet parallel (Street View lesson)
24:15 Cyber risk: breaches + bad access controls + spreadsheet exports
27:00 “Nothing to hide” is a trap
30:05 The real danger: rewind + retroactive suspicion
32:00 What you can do: disclosure, guardrails, and pressure points
34:20 Internet cookies → real-world cookies (attached to your car)
34:50 Keep on cyberin
#cybersecurity #privacy #surveillance #ALPR #licenseplatereaders #flock #flocksecurity #dataprivacy #infosec #FlockSafety #securityawareness #digitalrights
By LegitimateCybersecurityYou can be tracked in the real world—without consent—just by driving down a public road.
And the scariest part isn’t “live tracking”… it’s rewind: searchable history after the fact.
In this episode of Legitimate Cybersecurity, Frank Downs and Dustin Brewer break down Automated License Plate Readers (ALPRs)—why they’re popping up everywhere, why they’re easy to miss, and why the data is more dangerous than the camera.
You’ll learn:
What ALPR cameras capture (it’s more than “just plates”)
How cheap hardware + open source + cloud storage made this inevitable
Why “30-day retention” isn’t the same as “safe” once data is exported/shared
The governance gap: private vendors, thousands of customers, inconsistent rules
The cybersecurity risk nobody talks about: downstream buyers and sloppy security
Practical steps you can take to demand limits and transparency
Media/interview: [email protected]
Audio: https://legitimatecybersecurity.podbean.com/
Chapters:
00:00 You’re being monitored outside (no consent)
00:45 What ALPR is (and why it’s a misnomer)
01:30 Why it got cheap: hardware + open source + cloud
04:10 The U.S. privacy gap (no single overarching law)
05:00 These aren’t red-light cameras—why you don’t notice them
06:45 Flock Safety + the business of surveillance
08:20 “Vehicle fingerprinting” (tracking without “just plates”)
10:00 Who’s buying it: cities, states, feds… and HOAs
11:15 Data retention: policy vs reality (purge vs sanitize vs export)
13:45 Commercial surveillance = “fog” (hard to see, harder to fight)
14:40 Outsourcing “security” (the Pinkertons comparison)
17:10 Governance: why oversight breaks across customers/jurisdictions
18:30 The Wi-Fi packet parallel (Street View lesson)
24:15 Cyber risk: breaches + bad access controls + spreadsheet exports
27:00 “Nothing to hide” is a trap
30:05 The real danger: rewind + retroactive suspicion
32:00 What you can do: disclosure, guardrails, and pressure points
34:20 Internet cookies → real-world cookies (attached to your car)
34:50 Keep on cyberin
#cybersecurity #privacy #surveillance #ALPR #licenseplatereaders #flock #flocksecurity #dataprivacy #infosec #FlockSafety #securityawareness #digitalrights