Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementPhysicalSecurity NewswireTechnologies & SolutionsCybersecurity News

Automatic Number-Plate Recognition System Exposes 9 Million Records

license plate
May 1, 2020

Sheffield City Council's automatic number-plate recognition (ANPR) system in the UK exposed 8.6 million records of road journeys made by thousands of people, The Register reports. 

The Register claims that ANPR camera system's internal management dashboard could be accessed by simply entering its IP address into a web browser, and no login details or authentication of any sort was needed to view and search the live system – which logs where and when vehicles, identified by their number plates, travel through Sheffield's road network. According to The Register, a total of 8,616,198 records of vehicle movements, by time, location, and number plate, could be searched through the dashboard, and that number constantly grew as more number plates were captured by the 100 live cameras feeding the system, and locations of vehicles that were logged along with timestamps. 

Britain's Surveillance Camera Commissioner Tony Porter described the security lapse as "both astonishing and worrying," and demanded a full probe into the breach. Porter told The Register, "As chair of the National ANPR Independent Advisory Group, I will be requesting a report into this incident. I will focus on the comprehensive national standards that exist and look towards any emerging compliance issues or failure thereof."

Eugene Walker, Sheffield City Council's executive director of resources, together with Assistant Chief Constable David Hartley of South Yorkshire Police, told The Register, "We take joint responsibility for working to address this data breach. It is not an acceptable thing to have occurred. However, it is important to be very clear that, to the best of our knowledge, nobody came to any harm or suffered any detrimental effects as a result of this breach."

The dashboard was taken offline within a few hours of The Register alerting officials. Sheffield City Council and South Yorkshire Police added, "As soon as this was brought to our attention we took action to deal with the immediate risk and ensure the information was no longer viewable externally. Both Sheffield City Council and South Yorkshire Police have also notified the Information Commissioner's Office. We will continue to investigate how this happened and do everything we can to ensure it will not happen again."

Fausto Oliveira, Principal Security Architect at Acceptto, says that this is extremely concerning and demonstrates a series of gaps that he has pointed out several times in the past when talking about IoT. "I cannot understand why 3M or Neology didn't ship their systems with a set of security controls that would have prevented this incident from happening in the first place. There is no reason why a system that has access to so much private data is exposed on the Internet. There is absolutely no reason why such a system wouldn't enforce good authentication practices and require a form of Multi-Factor Authentication (MFA), after all, we are talking about tracking the movement of members of the general public. Access to such a system should be secured and access to this system should only be granted to members of the organization that have a legitimate legal / business need," he says.

To make matters worse, Oliveira adds, the fact that the web cameras are accessible from the Internet, without any form of protection, is opening "the door for any attacker to be able to obtain information about potential victims such as what is their habitual way to work, what time they leave, places they frequent, etc… With some sophistication, attackers could set up a surveillance system of their own to track the whereabouts of their victims. In the end, and in light of GDPR, the general public will have to pay the cost of this event twice. Firstly by losing their privacy and secondly, and I sincerely hope this happens, when the UK ICO fines the council for breaching the privacy of the general public diverting essential financial resources.”

Terence Jackson, Chief Information Security Officer at Thycotic, says, “This highlights the importance of having a mature risk management program. We have to treat risk as a continuous effort and not a point in time snapshot. In many networks systems come and go, but is there an audit trail or formal change management process to track them? You can’t protect what you do know exist. Misconfigurations do happen, however there should be a trail leading back to who approved the change and why? This incident is indeed worrisome, but unfortunately, not uncommon.”

Cybersecurity best practices would suggest that sensitive data should always be protected by reliable access controls, says Arun Kothanath, Chief Security Strategist at Clango. "Credentials can be stolen, passwords can be cracked, but identity and access management (IAM) programs driven by best practices can stop attackers in their tracks. If the Sheffield City Council had implemented an IAM program, then they could have controlled who had access to the ANPR camera system's internal management dashboard and effortlessly thwarted the attack. By controlling who can access what in an IT environment, an organization can effectively defend against even the most sophisticated cyberattacks," notes Kothanath. 

KEYWORDS: automatic license plate recognition cyber security data breach vehicle security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Career Intelligence
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • data breach warning

    Data breach exposes records of 2.5 million student loan borrowers

    See More
  • cybersecurity

    Mailfire data breach exposes more than 320 million records and PII of 70 websites

    See More
  • cybersecurity-blog

    Genius, French Postal Service App, Exposes 23 Million Records

    See More

Related Products

See More Products
  • The Database Hacker's Handboo

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing