Most people have never heard of it. But there is a good chance it has already seen you today.
Across the United States, a network of cameras is quietly spreading through cities, neighborhoods, and roadways. These are not government cameras. They are not operated by a federal agency. They are owned and operated by a private company, guided by one thing above all else: profit.
These automated license plate reader cameras photograph every vehicle that passes them, capture the plate number, the vehicle description, the time, and the location, and store all of it in a cloud database. That database is run not by any government entity but by the company itself, on servers managed by a third party cloud provider. The security of that data, and the rules around who can access it, are determined by a private corporation accountable primarily to its investors.
This is happening right now, in your town, possibly on your street.
How It Works.
The cameras are sold to police departments, neighborhoods, homeowners associations, and private businesses. Once installed, they run continuously, photographing and logging every vehicle that passes. The data is uploaded, stored, and made searchable. Law enforcement agencies can search across the entire network, meaning a camera installed in one city can be searched by an officer in another state entirely.
The company says all data is encrypted and deleted after 30 days. They say access is logged and limited to authorized users. They say the system is built for specific investigations, not broad surveillance.
That all sounds reassuring. But here is the problem. You are taking their word for it. A private company, built to generate profit, is telling you how safely they are handling data that tracks your daily movements. There is no independent government body auditing that claim on your behalf. There is no mechanism for you to dispute what the system records. There is no way for you to verify that the image associated with your plate has not been manipulated or accessed without authorization. If the system says your car was somewhere, that record exists, and you have almost no recourse to challenge it.
This is precisely why our legal system developed the protections it did. The right to face your accuser. The right to challenge evidence. The presumption of innocence. A private surveillance network operated for profit sits entirely outside those protections.
It Records More Than They Say.
The company describes these as license plate readers. That framing is deliberate, and it understates what the cameras actually capture.
Documented evidence has shown these cameras capturing enough detail to identify individual drivers inside vehicles, track pedestrian movement nearby, and record far more than a plate number. In at least one documented case, the footage was detailed enough to issue a traffic citation for phone use inside a moving vehicle, something a camera pointed purely at a license plate could not do.
The company says the cameras are strictly aimed at vehicle traffic. But the evidence of what the footage has actually been used for tells a different story. And again, you have no independent way to verify what is and is not being captured, stored, or retained beyond the window they claim.
The Cameras Can Be Compromised. Easily.
The company says the system is secure. Independent researchers say otherwise, and they have the proof.
In 2025, a security researcher purchased these cameras and began testing them for vulnerabilities. What he found was alarming. By pressing a button on the back of the device in a specific sequence, a wireless access point is created. Anyone who connects to it can take full control of the device. On newer models, plugging a small USB device into an exposed port achieves the same result in roughly five seconds.
Once inside the device, a bad actor could install malicious software, manipulate footage, or plant false data. The researcher described a scenario where someone could wirelessly connect to a camera and insert fabricated information that triggers a law enforcement alert against a vehicle whose owner had done absolutely nothing wrong.
The company confirmed the vulnerabilities were real, registered them in the national vulnerability database, and said patches had been issued. What they did not explain is how many cameras in the field remain unpatched, or how anyone would know if footage had already been tampered with.
Login credentials for the police portal were also found for sale on dark web marketplaces. The system does not require two factor authentication for all users, meaning a stolen password is potentially all it takes to access the data of an entire department's camera network.
This is the system your community is relying on to produce evidence used in criminal investigations.
The People Running It Are Still People.
The company points to its audit logs as proof of accountability. Every search is recorded, tied to a user, and reviewable. On paper, that sounds like a safeguard.
But here is what the actual record shows.
Across the country, there have been at least 14 documented cases of law enforcement officers using this system to stalk and monitor people for personal reasons. Not suspects. Not criminals. Spouses. Ex-partners. Strangers who caught their eye.
A former police chief resigned after using the cameras to track his ex-girlfriend's vehicle more than 200 times over several months, at one point following her and her new boyfriend in his police car. A police chief in another state was arrested and charged with stalking, misuse of automated license plate recognition systems, and violating his oath as a public officer.
These are not rogue officers at the bottom of the chain of command. These are people at the top. Chiefs. Lieutenants. People trusted with authority over the very system they abused.
Critically, most of these cases did not come to light through internal investigations or the company's own audit tools. They were discovered because victims reported the behavior, usually in the context of a broader stalking allegation.
The audit log did not stop the abuse. It did not even detect it. The victims did.
Emotions Override Morals. Every Time.
This is not an indictment of law enforcement. The vast majority of officers will never abuse this system. But that is not the point.
The point is that the system is operated by human beings. And human beings, regardless of their rank, their training, or their title, are subject to jealousy, obsession, anger, and poor judgment. We know this because we have always known this. It is why we built laws, courts, and oversight in the first place. No person should have unchecked access to a tool this powerful, because no person is immune to the moments when emotion overrides everything else.
Documented misuse cases have been described by officials as evidence of a systemic oversight gap rather than an isolated failure. That is an important distinction. An isolated failure is one bad actor. A systemic gap means the system itself has no reliable mechanism to prevent abuse before it happens, only to document it after the fact, and only if someone notices.
There is currently no requirement that a warrant be obtained before searching the system. There is no independent oversight body with authority to audit usage. There is no formal process by which an ordinary citizen can dispute or even view what the system has recorded about them.
Your Data. Their Rules. Their Servers.
All of the data this network collects is stored on servers managed by a third party cloud provider, under terms set by a private company. Their own policy acknowledges that data may be shared with third parties acting as sub-processors, and that in the event of a merger, acquisition, or sale of assets, that data goes with the transaction.
In plain terms: the company could be sold tomorrow. The data goes with it. The new owner is under no obligation to honor the policies the previous company made to you. And you will likely never know it happened.
What You Should Be Asking.
You do not have to be against public safety to ask these questions. In fact, asking them is what public safety should look like.
Who authorized these cameras in your community? What are the specific rules governing who can access the data? Is there any independent audit? What happens to your data if the company is sold? And if the system records something incorrect about you or your vehicle, what is your path to challenge it?
If nobody in your local government can answer those questions clearly, that is your answer.
The cameras are already there. The data is already being collected. The question is whether anyone is actually watching the people doing the watching.