A Benn Jordan Video on the Security Dangers of Flock
- deflock-bcs-equino
- Jan 18
- 3 min read

In a startling exposé released in late 2025, technologist and YouTuber Benn Jordan turned his spotlight on Flock Safety, a company best known for its networked surveillance cameras and license-plate readers deployed across thousands of U.S. cities. The video — titled “We Hacked Flock Safety Cameras in Under 30 Seconds” — isn’t just a technical demo; it’s a broad critique of how mass-market surveillance systems are built and governed.
What Jordan Demonstrated
Jordan’s central claim is simple but shocking: using tools and techniques within reach of an everyday user, he was able to uncover serious security flaws in Flock’s camera systems. He worked alongside cybersecurity researcher Jon “GainSec” Gaines, exploring vulnerabilities that allowed access to devices and data with minimal friction.
While the video’s title refers to physical tampering — like triggering a hidden Wi-Fi hotspot by pressing buttons on a camera’s back panel — Jordan also ties this into much larger systemic issues:
Some Flock units run old, unsupported Android versions that haven’t received updates in years, creating endless exploitable gaps.
There are hardcoded Wi-Fi settings that can let cameras connect to rogue networks, bypassing basic authentication.
Core security practices such as mandatory two-factor authentication are not enforced for all users, potentially exposing law enforcement interfaces to unauthorized access.
Jordan frames this most starkly: pressing a few buttons → connecting to a Wi-Fi hotspot → enabling debug access → rooting the camera. All in a matter of seconds.
Beyond the Title: Real-World Implications
The video isn’t only about one exploit. Jordan delves into how easily these cameras — especially Flock’s AI-powered Condor PTZ models — were found online with no passwords, encryption, or login required. With a simple query on an internet-connected device search engine, his team located dozens of exposed camera feeds streaming live to the open web. These feeds included not just public streets, but parks, trails, and spaces where privacy is reasonably expected.
Once inside these live admin interfaces, Jordan showed he could:
View live and archived footage up to a month old.
Download video and browse logs without any authentication.
Adjust camera settings or run diagnostics.
This isn’t a distant server hack — it’s your neighborhood camera network essentially operating like a poorly protected “Netflix for surveillance.”
The Privacy Angle
Jordan peppers his video with moments meant to humanize the stakes. He describes watching mundane activities — someone leaving home, a jogger on a trail, even someone quietly using a swing set — all because an exposed camera was left online without protection. To him, this isn’t abstract cyber-security drama; it’s an intimate intrusion into everyday life.
His argument is clear: surveillance infrastructure, especially when funded by public dollars and used by police, should be built with security and privacy at the core — not as an afterthought.
Flock’s Response & Broader Reaction
In the wake of the exposure, Flock Safety has responded by saying that the exposed devices were affected by a limited misconfiguration that’s since been fixed, and that their cloud systems haven’t been breached.
But Jordan’s video — and related reports — have ignited broader discussions online and even among privacy advocates and lawmakers:
Some argue these cameras represent a surveillance infrastructure gone unchecked, with little transparency or public oversight.
Others note that even if misconfigurations get patched, design flaws and lax security defaults remain troubling.
At least one legislative body has called for federal investigation into Flock’s cybersecurity practices.
Final Takeaway
“We Hacked Flock Safety Cameras in Under 30 Seconds” isn’t just a catchy title — it’s a provocation. Jordan is challenging not only the technical robustness of a widely deployed system, but also how society treats surveillance, privacy, and public accountability in the age of cheap, ubiquitous AI-enabled cameras.
Whether you’re a tech professional, privacy advocate, or just a curious citizen, the video underscores a larger truth: if surveillance systems aren’t secure, they become threats in their own right. And the consequences — from unauthorized viewing to uncontrolled data access — are as real as the footage these devices collect.




Comments