{"id":94923,"date":"2026-03-04T18:00:00","date_gmt":"2026-03-04T15:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=94923"},"modified":"2026-03-13T08:29:15","modified_gmt":"2026-03-13T05:29:15","slug":"dont-look-at-me","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/dont-look-at-me\/","title":{"rendered":"Don&#8217;t Look At Me"},"content":{"rendered":"<p>In the world\u2019s biggest cities, humble security cameras have given way to sprawling systems powered by artificial intelligence. For better or worse, many of us now accept what once read like dystopian fiction.<\/p>\n<p>Krzysztof Shpak examines how AI street-surveillance systems work and why governments rushed to roll them out.<\/p>\n<h2 class=\"wp-block-heading\">Flock police<\/h2>\n<p>In September 2025 a Denver police officer stood at the door of Krisanna Elzer with a court summons. The homeowner was <a title=\"\" href=\"https:\/\/coloradosun.com\/2025\/10\/28\/flock-camera-police-colorado-columbine-valley\/\" target=\"_blank\" rel=\"noopener\">accused<\/a> of stealing a package from a neighbour\u2019s porch in a nearby town.<\/p>\n<p>The evidence came from Flock Safety, a commercial automated video-surveillance system that had recorded Elzer\u2019s car. The officer refused to share details with the suspect, telling her to raise any objections in court.<\/p>\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>&#8220;You know we have cameras in that town. Not even a breath of fresh air will leave there without our knowledge,&#8221; the officer explained.<\/em><\/p><\/blockquote>\n<p>Convinced of her innocence, Elzer began gathering her own evidence. She had indeed been nearby that day \u2014 visiting a tailor \u2014 but had not stolen anyone\u2019s parcel.<\/p>\n<p>She compiled GPS data from apps on her phone and in her car, dashcam footage, witness statements and even photos of the clothes she wore on the day of the alleged crime.<\/p>\n<p>After repeated failed attempts to hand the information to the authorities, the suspect wrote directly to the police chief. He praised her work and said the summons had been annulled.<\/p>\n<p>As of December 2025, Flock Safety <a title=\"\" href=\"https:\/\/jsis.washington.edu\/humanrights\/wp-content\/uploads\/sites\/22\/2025\/10\/Leaving-the-Door-Wide-Open-Flock-WA.pdf\" target=\"_blank\" rel=\"noopener\">offered<\/a> access to 80,000 cameras across 49 American states.<\/p>\n<h2 class=\"wp-block-heading\">From monitor vans to crime prediction<\/h2>\n<p>Cameras on streets, in shops and in public buildings have long been ubiquitous. Today\u2019s smart cameras and data-processing methods, however, are a different beast.<\/p>\n<h3 class=\"wp-block-heading\">CCTV in the analogue era<\/h3>\n<p>Once upon a time, closed-circuit television (CCTV) meant a private network of cameras feeding a dozen monitors watched by a bored mall guard.<\/p>\n<p>The technology amounted to image sensors, screens and recording equipment.<\/p>\n<p>Security services have experimented with surveillance systems since at least the mid-20th century.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" class=\"wp-image-276201\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-c767755fecab2bbf-7851533659120250.webp\" alt=\"image\" \/><figcaption class=\"wp-element-caption\">Testing a CCTV system by British police in Trafalgar Square, 1960. Source: <a title=\"\" href=\"https:\/\/discovery.nationalarchives.gov.uk\/details\/r\/C555784\" target=\"_blank\" rel=\"noopener\">The National Archives<\/a>.\u00a0<\/figcaption><\/figure>\n<p>In 1960 British police <a title=\"\" href=\"https:\/\/professionalsecurity.co.uk\/news\/case-studies\/polices-1960s-cctv-experiments-part-1\/\" target=\"_blank\" rel=\"noopener\">tested<\/a> two cameras monitoring Trafalgar Square during a visit by the king and queen of Thailand. Monitors sat in a van nearby. The trial exposed several technical issues and drew mixed reactions.<\/p>\n<p>In 1979 the government research outfit Police Scientific Development Branch <a title=\"\" href=\"http:\/\/www.anpr-international.com\/history-of-anpr\/\" target=\"_blank\" rel=\"noopener\">developed<\/a> <span class=\"old_tooltip\" data-descr=\"automatic recognition of vehicle license plates\">ANPR<\/span> using then-available optical character recognition methods.<\/p>\n<p>By the 1990s, cameras on intersections and fa\u00e7ades were the norm. Law enforcement folded CCTV and ANPR into everyday policing.<\/p>\n<h3 class=\"wp-block-heading\">Smart cameras<\/h3>\n<p>With miniaturised computing, pervasive connectivity and the rise of AI, the traditional CCTV rig has been supplanted by smart cameras tied to central databases and automated analytics.<\/p>\n<p>Such a device <a title=\"\" href=\"https:\/\/www.hikvision.com\/content\/dam\/hikvision\/en\/brochures-download\/product-brochures\/White-Paper_The-role-of-Artificial-Intelligence-to-transform-video-imaging_Hikvision-and-SourceSecurity_20240708.pdf\" target=\"_blank\" rel=\"noopener\">comes<\/a> with its own processor and OS, storage, and interfaces for local and internet connectivity, and sometimes a microphone for audio.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" class=\"wp-image-276202\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-2b5d664375b0a2ec-7851667301706727.webp\" alt=\"image\" \/><figcaption class=\"wp-element-caption\">A Flock Safety camera with ANPR functions. Source: <a title=\"\" href=\"https:\/\/en.wikipedia.org\/wiki\/Flock_Safety#\/media\/File:Flock_Safety_camera.jpg\" target=\"_blank\" rel=\"noopener\">Wikimedia<\/a>.\u00a0<\/figcaption><\/figure>\n<p>Some makers <a href=\"https:\/\/www.arecontvision.com\/news\/intelligence-in-ai-cameras-enabled-by-hardware-advances\">embed<\/a> AI accelerators and NPU (Neural Processing Unit) modules to process data on the device in real time. Others offload AI tasks to external hardware.<\/p>\n<p>These systems can identify objects, recognise licence plates and faces, and store summaries of what they see. Capabilities vary with software configuration and vendor preferences.<\/p>\n<h3 class=\"wp-block-heading\">A brain behind the scenes<\/h3>\n<p>On its own, a smart camera can recognise objects and record their identifiers \u2014 a car\u2019s plate, a face, or a person\u2019s gait. An analytics hub aggregates camera feeds, fuses them with other sources and sends findings to an operator.<\/p>\n<p>Flock Safety <a title=\"\" href=\"https:\/\/www.404media.co\/license-plate-reader-company-flock-is-building-a-massive-people-lookup-tool-leak-shows\/\" target=\"_blank\" rel=\"noopener\">offers<\/a> something similar in Nova, a \u201cpublic-safety data platform\u201d that ingests not only surveillance footage but also information from leaks, data-broker databases and other commercially available sources.<\/p>\n<p>Such a system builds dossiers with movement maps, preferences, browsing history, habits, police records and anything else available.<\/p>\n<p>Armed with such troves, AI can hypothesise about people\u2019s behaviour and alert operators to situations it deems suspicious. That option is <a title=\"\" href=\"https:\/\/www.aclu.org\/news\/national-security\/surveillance-company-flock-now-using-ai-to-report-us-to-police-if-it-thinks-our-movement-patterns-are-suspicious\" target=\"_blank\" rel=\"noopener\">already available<\/a> to Flock\u2019s customers.<\/p>\n<p>According to the company, Nova lets agencies close cases \u201cin one click\u201d.<\/p>\n<p>According to <a title=\"\" href=\"https:\/\/www.eff.org\/deeplinks\/2025\/12\/effs-investigations-expose-flock-safetys-surveillance-abuses-2025-review\" target=\"_blank\" rel=\"noopener\">critics<\/a>, it allows warrantless tracking and invites sweeping privacy abuses.<\/p>\n<h2 class=\"wp-block-heading\">Colourful hair and code injection<\/h2>\n<p>Many people shrug at mass surveillance, seeing it as a tool for solving and preventing crime. Others are less sanguine about the bounds of personal freedom.<\/p>\n<p>The tug-of-war between smart cameras and those seeking privacy plays out on several fronts.<\/p>\n<p>Beyond public-policy battles, enthusiasts turn to camouflage \u2014 and to classic hacking.<\/p>\n<h3 class=\"wp-block-heading\">Spoofing<\/h3>\n<p>The most intriguing attacks on such devices are spoofing, or \u201cpresentation attacks\u201d, methods that manipulate the image a camera receives.<\/p>\n<p>These include masks, retroreflectors, specialised textures and other ways to \u201cspoil\u201d an image so the system fails to detect or correctly identify an object.<\/p>\n<p>In 2016 designer Scott Urban\u2019s <a title=\"\" href=\"https:\/\/www.kickstarter.com\/projects\/reflectacles\/reflectacles-reflective-eyewear-and-sunglasses\" target=\"_blank\" rel=\"noopener\">Reflectacles<\/a> project offered eyewear with a retroreflector that bounces a surveillance camera\u2019s infrared light back, blowing out the face image.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" class=\"wp-image-276199\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-20bd2f2e90c1aa4b-7851533650200844.webp\" alt=\"image\" \/><figcaption class=\"wp-element-caption\">Reflectacles on surveillance video. Source: Kickstarter.<\/figcaption><\/figure>\n<p>This brute-force tactic can deprive a single camera of usable data, but it falters when multiple angles are in play.<\/p>\n<p>Berlin-based researcher and artist Adam Harvey developed a series of <a href=\"https:\/\/adam.harvey.studio\/cvdazzle\/\">CV Dazzle<\/a> countermeasures to facial recognition.<\/p>\n<p>His early-2010s looks relied on asymmetric hairstyles and makeup elements designed to fool the then-popular <a href=\"https:\/\/ru.wikipedia.org\/wiki\/%D0%9C%D0%B5%D1%82%D0%BE%D0%B4_%D0%92%D0%B8%D0%BE%D0%BB%D1%8B_%E2%80%94_%D0%94%D0%B6%D0%BE%D0%BD%D1%81%D0%B0\">Viola\u2013Jones algorithm<\/a>, which detects under-eye and nasal shadows, facial symmetry and nose-bridge location.<\/p>\n<p>His answer: unconventional shadow placements and colours that contrast with skin tone.<\/p>\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" class=\"wp-image-276198\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-782e2aba257ab4c9-7851533641910280.webp\" alt=\"image\" \/><figcaption class=\"wp-element-caption\">CV Dazzle Look 5. Source: Adam.harvey.studio.<\/figcaption><\/figure>\n<p>With the rise of AI facial-recognition systems, the old tricks dated; in 2020 Harvey proposed an updated makeup approach.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-276200\" src=\"https:\/\/forklog.com\/wp-content\/uploads\/img-f2781be8b803167c-7851533845101894-1024x770.png\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/forklog.com\/wp-content\/uploads\/img-f2781be8b803167c-7851533845101894-1024x770.png 1024w, https:\/\/forklog.com\/wp-content\/uploads\/img-f2781be8b803167c-7851533845101894-300x226.png 300w, https:\/\/forklog.com\/wp-content\/uploads\/img-f2781be8b803167c-7851533845101894-768x577.png 768w, https:\/\/forklog.com\/wp-content\/uploads\/img-f2781be8b803167c-7851533845101894.png 1200w\" alt=\"image\" width=\"1024\" height=\"770\" \/><figcaption class=\"wp-element-caption\">CV Dazzle Look 6 and 7. Source: Adam.harvey.studio.<\/figcaption><\/figure>\n<p>He stressed he was demonstrating a technique, not fixed patterns; the best solution depends on the surveillance context.<\/p>\n<p>Similar methods apply to plate recognition. American enthusiast Benn Jordan <a title=\"\" href=\"https:\/\/www.youtube.com\/watch?v=Pp9MwZkHiMQ\" target=\"_blank\" rel=\"noopener\">described<\/a> how to craft \u201cadversarial\u201d textures for ANPR detectors.<\/p>\n<p>Using open recognition models, Jordan trained a neural network to generate visual noise that, when overlaid on a licence plate, makes the model read incorrect characters or fail to \u201csee\u201d the plate at all.<\/p>\n<p>The problem with visual tricks is their fragility. Efficacy depends on conditions and on camera coverage. Meanwhile, surveillance vendors keep expanding the cues used for recognition, such as a person\u2019s distinctive gait or a car\u2019s colour and unique modifications.<\/p>\n<p>Researchers continue to probe advanced models for weaknesses, but a clearer threat to smart-camera systems comes from hackers.<\/p>\n<h3 class=\"wp-block-heading\">Device compromise and network attacks<\/h3>\n<p>Like any internet-connected computer \u2014 AI or not \u2014 smart cameras and their back-end infrastructure are vulnerable to hacking.<\/p>\n<p>Over the years, numerous vulnerabilities have been documented.<\/p>\n<p>In 2021 a code-injection <a title=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-36260\" target=\"_blank\" rel=\"noopener\">vulnerability<\/a> was found in Hikvision surveillance cameras. It allowed full device takeover, software installation and access to other cameras on the network.<\/p>\n<p>In 2023 the operating system of Axis smart cameras contained a <a title=\"\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-21413\" target=\"_blank\" rel=\"noopener\">flaw<\/a> enabling arbitrary command execution during installation of <a title=\"\" href=\"https:\/\/en.wikipedia.org\/wiki\/Application_Configuration_Access_Protocol\" target=\"_blank\" rel=\"noopener\">ACAP applications<\/a>.<\/p>\n<p>In 2025 surveillance systems by Dahua were found to have <a title=\"\" href=\"https:\/\/securityaffairs.com\/180602\/hacking\/dahua-camera-flaws-allow-remote-hacking-update-firmware-now.html\" target=\"_blank\" rel=\"noopener\">two vulnerabilities<\/a> related to remote command execution and buffer overflow. Both allowed an attacker full control of a camera.<\/p>\n<p>A separate attack vector is direct interaction with hardware often mounted outdoors in public places. An attacker can use service interfaces, access local storage or modify a device for their own ends.<\/p>\n<p>To counter direct attacks, manufacturers encrypt data, use <a title=\"\" href=\"https:\/\/www.hikvision.com\/en\/newsroom\/blog\/firmware-security-risks-and-mitigation\/\" target=\"_blank\" rel=\"noopener\">hardware verification of firmware<\/a> and <a title=\"\" href=\"https:\/\/developer.axis.com\/video-streaming-and-recording\/signed-video\/\" target=\"_blank\" rel=\"noopener\">add cryptographic signatures<\/a> to video files.<\/p>\n<p>A properly configured device cannot simply be \u201creflashed\u201d or have data pulled off it. But mistakes happen.<\/p>\n<p>In 2025, 404 Media <a title=\"\" href=\"https:\/\/www.404media.co\/flock-exposed-its-ai-powered-cameras-to-the-internet-we-tracked-ourselves\/\" target=\"_blank\" rel=\"noopener\">reported<\/a> that at least 60 Flock Safety Condor AI cameras with people-tracking features were left open to unauthorised access.<\/p>\n<p>Cybersecurity specialist John Gaines and the above-mentioned researcher Benn Jordan found the devices\u2019 IP addresses using the Shodan search engine and discovered they could connect with no login or password.<\/p>\n<p>A journalist in the frame of a Flock surveillance camera. Source: 404 Media.<\/p>\n<p>Anyone could watch live streams, download 30 days of archives, change settings and read system logs.<\/p>\n<p>The vendor blamed \u201ca misconfiguration affecting a limited number of devices\u201d and said the problems had been fixed.<\/p>\n<p>The same researchers said another Flock camera model exposes an open Wi-Fi access point if certain buttons on the case are pressed, granting full control over the device and its software.<\/p>\n<p>Gaines published an analysis of these and other flaws in Flock\u2019s system in a <a href=\"https:\/\/github.com\/GainSec\/anti-crime-ecosystem-research\">separate document<\/a> covering 55 items.<\/p>\n<p>In its official response the company <a href=\"https:\/\/www.flocksafety.com\/blog\/response-to-compiled-security-research-on-flock-safety-devices\">said<\/a> the issues were already known, and that would-be attackers rely on direct access to cameras and \u201cdeep knowledge of the equipment\u2019s internals\u201d.<\/p>\n<p>The vendor stressed that all necessary updates are delivered without customer action and that system operations face no threat.<\/p>\n<h2 class=\"wp-block-heading\">Tackling the \u201cpartially competent\u201d<\/h2>\n<p>Automated surveillance systems, especially with AI, have become a convenient tool for law enforcement.<\/p>\n<p>Vendors sell their wares on promise: here\u2019s the suspect\u2019s car and a map of its movements; here\u2019s the address. Cases can now be closed with a click.<\/p>\n<p>That ease is habit-forming. People tend to over-rely on automated outputs \u2014 a classic <a href=\"https:\/\/en.wikipedia.org\/wiki\/Automation_bias\">cognitive bias<\/a>.<\/p>\n<p>AI-powered automation follows the same pattern: many users assume ChatGPT\u2019s answers are correct and ignore contradictions. In everyday contexts this can distort perceptions and, in some cases, lead to <a href=\"https:\/\/en.wikipedia.org\/wiki\/Chatbot_psychosis\">psychoses<\/a>.<\/p>\n<p>Even under an engineering ideal and in the hands of authorised operators, a large AI-driven surveillance system can do harm.<\/p>\n<p>In 2025 American authorities <a href=\"https:\/\/krishnamoorthi.house.gov\/media\/press-releases\/ranking-members-krishnamoorthi-and-garcia-demand-accountability-flock-group\">opened an investigation<\/a> into possible use of Flock Safety\u2019s technologies for unlawful tracking. Police were suspected of using the system to find immigrants and to monitor women crossing state lines in search of jurisdictions where abortions are legal.<\/p>\n<p>In this case the system worked as designed: no one tricked detectors, hacked cameras or swapped in deepfakes.<\/p>\n<h2 class=\"wp-block-heading\">Don\u2019t break it, improve it<\/h2>\n<p>CCTV is already ubiquitous. AI-enhanced analytics for surveillance is the new reality.<\/p>\n<p>Even the boldest asymmetric mask and fully obscured licence plates will not secure privacy amid total data collection.<\/p>\n<p>Like any powerful tool, AI-driven surveillance needs regulation to prevent unlawful use and sloppy security by vendors and operators.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why governments rushed to embed AI in urban surveillance.<\/p>\n","protected":false},"author":1,"featured_media":94924,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"AI-powered street surveillance spreads, and the pushback\u2014and slip-ups\u2014mount.","creation_source":"ai_translated","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1144],"tags":[438,2348,286],"class_list":["post-94923","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-longreads","tag-artificial-intelligence","tag-control","tag-society"],"aioseo_notices":[],"amp_enabled":true,"views":"161","promo_type":"1","layout_type":"1","short_excerpt":"AI-powered street surveillance spreads, and the pushback\u2014and slip-ups\u2014mount.","is_update":"0","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/94923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=94923"}],"version-history":[{"count":2,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/94923\/revisions"}],"predecessor-version":[{"id":95183,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/94923\/revisions\/95183"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/94924"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=94923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=94923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=94923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}