• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Jobs
  • Career
    • Cyber Security Training
    • Work from Home
    • Cyber Security Analyst
    • Remote Work – Six Ways to Keep Your Data Safe When Working Remotely
  • Field Guide
  • Newsletter Signup
  • Deals
  • News
AskCyberSecurity.com

AskCyberSecurity.com

Cyber Security News & Information

  • Home
  • Data Privacy
    • Gamers
    • Government Cyber Security
      • Legislation
      • Standards
        • What are the risks of computer security?
        • Medical Cyber Security
    • Social Media
  • Security
    • Data Breaches
    • Scams
    • Malware
  • Software
    • Apps
    • Web Browsers
  • Glossary
    • Cyber Security Acronyms
  • About Ask Cyber Security
    • Authors
    • Contact Us
  • VPN
    • How Do I Know If My VPN is Working?
    • Best Free VPN iPhone
    • Why Use a VPN?
    • NordVPN vs IPVanish
    • Private Internet Access Download
    • Best VPN for Streaming
      • TikTok VPN
    • VPN Porn
    • Computer Security Software – What You Really Need
  • Tutorials
  • ChatGPT
    • Does ChatGPT Save Data?
AskCyber Home » News » Government Cyber Security » Perceptics Border Security Firm Hacked

Perceptics Border Security Firm Hacked

2019-05-28 by Michelle Dvorak

Perceptics LPR Hack

Perceptics license plate reader technology hacked

Perceptics, a US technology firm that sells land border security technologies to governments was hacked. Perceptics deals in border security vehicle data acquisition, commercial vehicle inspection, electronic toll collection, and roadway monitoring. The hacked data includes vehicle personal vehicle data, images, business plans, human resources documents, financial figures, and personal information. The hacker, Boris Bullet-Dodger, posted the hacked data on the deep web, free to anyone who can access it with a dark web browser like Tor.

Perceptics sells license plate readers (LPRs), license plate recognition systems, and vehicle identification products. The company’s license plate readers are installed at all land border crossing lanes between the United States, Canada, and Mexico to monitor privately owned vehicle traffic as automobiles cross into and out of the United States. Government clients include the US Department of Defense, US Department of Justice Drug Enforcement Administration, US Border Patrol, Singapore Customs, Canada Border Services Agency, US Social Security Administration, US Air Force, and the city of Abu Dhabi. Within the United States, Perceptics technology is used by state departments of transportation including Oklahoma, Alabama, Florida, Wisconsin, Idaho, and Oregon.

The company confirmed the cyber security incident. Perceptics is the most-used automobile license plate reader manufacturer in the United States. License Plate Recognition cameras originated in Europe where they are referred to as Automatic Number Plate Recognition (ANPR). In North America, automobile tags are called “license plates” rather than “number plates” as they are called in Europe.

Perceptics LPRs scans automobile license plates with read rate accuracy of 95% or more. According to their corporate website, Perceptics technologies are also used for:

  • Electronic toll collection
  • Identification of stolen and wanted vehicles/suspects
  • AMBER & Silver Alerts
  • Homeland Security intelligence initiatives
  • Interdiction of illegal drug trafficking
  • Other law enforcement or national security purposes

About 65,000 files with hundreds of gigabytes of data were hacked. Evidence of the data posted on the deep web and sent to The Register website. File formats include Microsoft Excel xlsx files named after locations and postal codes. There .jpg format image files named for “driver” and “scene.” Other files are Microsoft Word files .docx files associated with government agencies like U.S. Immigration and Customs Enforcement. Other files are database files, HTML pages, and other image formats.

Are License Plate Readers Legal?

Yes. The majority of police agencies in the United States use some form of LPR. License plates may be compared to databases including identifying wanted felons, AMBER Alerts, missing persons, recovery of stolen vehicles, locating gang member, and apprehending known and suspected terrorists. LPR technology is also used for electronic toll collection.

While license plate readers have many legitimate law enforcement duties, data is being stored about millions of innocent citizens. In July 2012, the American Civil Liberties Union sent public records act requests to over six-hundred police agencies. The findings reported that LPRs capture much more than license plates at border crossings and contain a lot of personal data on the whereabouts of innocent citizens in their daily lives. This stored data can include video surveillance of private buildings, passengers in automobiles, attendance of religious meetings, and visits to private businesses.

How Do License Plate Readers Work?

License plate readers can be mounted on police cars, attached to roadside poles, or stationary objects like bridges. LPRs readers capture an image of the license plate number of a car and the date, time and location. They are not used to issue speeding violations. However, they are used to apprehend criminal suspects.

Perceptics recently announced that “a key contract by US Customs and Border Protection to replace existing LPR technology, and to install Perceptics next generation License Plate Readers (LPRs) at 43 US Border Patrol checkpoint lanes in Texas, New Mexico, Arizona, and California.”

Filed Under: Government Cyber Security Tagged With: DHS, facial recognition

About Michelle Dvorak

Michelle writes about cyber security, data privacy focusing on social media privacy as well as how to protect your IoT devices. She has worked in internet technology for over 20 years and owns METRONY, LLC. Michelle earned a B.S. in Engineering from Rensselaer Polytechnic Institute. Michelle published a guide to Cyber Security for Business Travelers


LinkedInTwitterFacebook

Primary Sidebar

Subscribe to Our Free Newsletter

We Don't Share or Sell Your Info

Web Browsers

Where Are My Saved Passwords in Chrome?

Google Removes 70 Malicious Browser Add-ons from Chrome Web Store

Firefox 75 Reports Your Browser Settings to Mozilla

Categories

Cyber Security Field Guide

Computer Security While TravelingGet Our Cyber Security Field Guide - Available on Amazon!

Recent Posts

Security Marketing Manager – Remote

Sr. Associate, Cybersecurity Architect – Pfizer

Strategic Customer Success Manager – Cybersecurity – Opportunity for Working Remotely

Top 20 Passwords Leaked on Dark Web

ISU Cybersecurity Leader Job Opening

Cyber Security News

Top 20 Passwords Leaked on Dark Web

… [Read More...] about Top 20 Passwords Leaked on Dark Web

Apple Warns of Actively Exploited Zero-Day Flaw

… [Read More...] about Apple Warns of Actively Exploited Zero-Day Flaw

IRS Stops Facial Recognition System for Online Access

… [Read More...] about IRS Stops Facial Recognition System for Online Access

National Cybersecurity Alliance Announces Data Privacy Week

… [Read More...] about National Cybersecurity Alliance Announces Data Privacy Week

More Cyber Security News

Tags

amazon Android Apple bitcoin China chrome CISA credit card DarkSide DHS DOJ Equifax Europe Facebook facial recognition FBI Firefox FTC games GDPR Google Government hacker identity theft India iPhone Iran IRS LinkedIn Microsoft North Korea PayPal phishing phishing email ransomware REvil Russia smartphone T-Mobile TikTok tutorial VPN WhatsApp WiFi Windows

Government

CBP Looks to Access Airline Passenger Data

FTC Releases Cyber Threat Video Playlist

Malware Found on US Government Funded Phones

UK NCA Reaches Out to Youth to Deter Cybercrimes

More Posts from this Category

Footer

Menu

  • Home
  • About
  • Authors
  • Newsletter Signup
  • PRIVACY POLICY

Search

Why Use a VPN?

NordVPN vs IPVanish VPN Review

NAVIGATION

  • Data Breaches
  • Data Privacy
  • Gamers
  • Scams
  • Malware

MEMBER NJCCIC

New Jersey Cybersecurity & Communications Integration Cell

STAY CONNECTED

  • Facebook
  • Instagram
  • Pinterest
  • YouTube
  • Twitter
  • RSS

Copyright © 2023 · AskCyberSecurity.com · METRONY, LLC

Go to mobile version