Podcast Summary: The 404 Media Podcast – "The (Hacked) Spy In Your Car"
Date: September 17, 2025
Hosts: Joseph, Sam Cole, Jason Kebler
Main Topics: Nexar dashcam surveillance, data broker partnerships, a major data breach, privacy vulnerabilities, and the sentencing of the Girls Do Porn ringleader.
Episode Overview
In this episode, the 404 Media team dives into two major stories:
-
How Nexar Dashcams Became a Nationwide Surveillance Network—and Got Hacked:
The hosts explain how dashcams marketed for driver safety are also being used to build a vast virtual CCTV network, with the company Nexar at the center. A recent hack exposed sensitive private and national security-related footage, raising urgent concerns about privacy, data security, and the surveillance economy. -
The Sentencing of Michael Pratt ("Girls Do Porn" ringleader):
Sam Cole recounts her trip to the dramatic federal sentencing hearing of Michael Pratt, describing powerful victim statements and the atmosphere as years of investigative reporting come to a close with a rare example of justice in online abuse.
Key Story #1: Nexar Dashcams, Surveillance, and the Major Hack
Background on Nexar
- Nexar sells dashcams to everyday drivers, especially rideshare (Uber/Lyft) operators (02:28).
- The dashcams:
- Record outward for car crashes.
- Some also record inside the vehicle (for driver and passenger safety).
- Business Model:
- Sells hardware directly to consumers.
- And uploads dashcam footage to a public AI-analyzed map, identifying road signs, traffic, roadworks, selling this data to other companies (03:15).
Quote [03:15] – Joseph:
"The other thing that Nexar sells is kind of like a data broker business...they take footage generated or, you know, streamed from these dashcams, they upload it to a public map that anyone can access. ...Nexar then sells that data to a bunch of other companies."
Partnerships and Surveillance Concerns
- Nexar considered a partnership with Flock Safety, a controversial surveillance company with tens of thousands of ALPR (automatic license plate recognition) cameras across the U.S., selling access to law enforcement (05:45).
- Implications: Dashcam data could potentially be tied into police or government surveillance.
Quote [07:18] – Joseph:
"...Nexar has all of these dashcams in all of these vehicles and it's trying to partner with Flock, whose business is selling basically intelligence to law enforcement... it brings up all of these questions about, well, what are they going to do with this dashcam footage?"
The Hack: What Happened?
How the breach occurred (12:00):
- A hacker found that every Nexar dashcam contained a key to an Amazon Web Services (AWS) bucket.
- This key allowed broad access—not just for the camera's own data, but all dashcam footage.
- Over 130TB of unblurred, raw dashcam video was accessible, including sensitive in-car conversations and rideshare footage.
Quote [12:36] – Joseph:
"...The key had too high privileges in that it allowed a third party, a hacker or somebody else to actually access everybody's dashcam footage, which is obviously really, really bad."
Privacy Fail:
- Nexar claimed all blurring/anonymization happened on-device as per its privacy policy. In practice, the hack revealed a backup database with raw footage was accessible and unblurred (14:36).
- Examples of what was exposed:
- Personal conversations (e.g., FaceTime calls)
- Private moments (crying babies)
- Rideshare interiors with full passenger conversations and faces (15:55).
Wider Impacts: Why This Is Disturbing
- Personal and National Security:
- Some dashcams belonged to people visiting/working at highly sensitive locations—including U.S. military, Air Force bases, and even the CIA (19:41).
- Exposed data could reveal commute paths, identities, vehicle details—potentially a gift to foreign intelligence agencies.
Quote [21:11] – Joseph:
"...the hacker was able to find, through that publicly available map, hey, there's a car. Which is going to the CIA's headquarters...If this person is going to CIA every day...and they've screwed up even once or a few times, hey, that could be beneficial [to adversaries]."
- Corporate Customers and Data Flow:
- List of companies interested in or buying Nexar’s data included Microsoft, Apple, Google, major AI and mapping companies, and even Niantic (the Pokémon Go company, now owned by a Saudi sovereign wealth fund) (22:47, 23:59).
Quote [23:59] – Jason:
"...the Saudi...sovereign wealth fund...bought Pokémon Go from Niantic. And so, yeah, it's now tied to the Saudi government in some way. That's just, I don't know, another layer to this."
Takeaway Messages
- The dashcam economy is built on the tension between safety, surveillance, and the monetization of personal journeys.
- Even devices marketed for personal protection can become broad, unintentional surveillance platforms—feeding data into law enforcement, governments, or global data markets.
- Security practices (like improperly secured cloud keys) can put millions of people’s private moments—and national security—at risk.
Key Story #2: In-Person at the Michael Pratt ("Girls Do Porn") Sentencing
Context:
Sam Cole has reported for years on the "Girls Do Porn" case—a massive, lucrative sex trafficking operation targeting unwitting women under false pretenses and publishing abuse online.
At the Federal Sentencing (San Diego)
- Sam attended Pratt’s sentencing in person—her first time in a federal courtroom (30:51).
- Expectations vs. Reality:
- Expected a quick process; instead, it lasted five hours due to dozens of powerful victim impact statements.
Quote [31:27] – Sam:
"...almost all of them, all but one, said, 'give him the maximum, give him life. Like, there's no amount of time that you can give him that would be too much.' ...It was very cathartic for them. Very cathartic for anyone who's ever been following the story."
- Pratt’s Attitude:
- Appeared unkempt, gave a minimal and unconvincing apology (33:29).
Quote [33:39] – Sam:
"He said it was never my intention to hurt anybody...he had given an apology, a written apology that was also pretty short ... It was not really convincing remorse and it was not convincing to anybody that was there."
The Women's Stories and the Consequences
- Many women testified about lifelong trauma; numerous tried or contemplated suicide, suffered addiction, or were driven to complete isolation due to the abuse and its public aftermath.
- At least 15 women believed to have died since participating, according to various statements (38:18).
- One mother of a deceased victim spoke through tears—she only recently realized her daughter’s substance abuse spiral began with her Girls Do Porn abuse (41:38).
- Some victims directly confronted Pratt, calling him a pedophile, forcing him to listen to the impact of his actions.
Quote [41:11] – Sam:
"They would frequently turn around and say it. Would ask the judge, 'can I drive permission to speak to the defendant?' ...One woman was targeted when she was very young and she kind of whipped around and looked right at him and said, hey, pedophile."
The Sentence and Aftermath
- Judge sentenced Pratt above recommendations: 27 years in federal prison plus ten years’ probation and multiple restrictions (45:18).
- The judge highlighted that Pratt’s role (“the puppeteer”) was even more egregious than his already-convicted accomplice.
- The room felt “relief...cathartic, because all these things had finally been said to this man who was puppeteering this entire operation” (46:41).
Quote [49:30] – Sam:
"...it is a story start to finish of these women coming together and saying we're not going to let this slide. ...It doesn't fix what happened in any way, but it is like the best ending that they could have asked for—to see some sort of justice."
Notable Quotes & Memorable Moments
- [03:15] – Joseph: “They're basically trying to do both sides of the transaction. They're trying to sell the hardware to ordinary drivers and then all of this data that's being collected. Why don't we monetize that as well?”
- [14:36] – Joseph: “These videos that the hacker accessed were not blurred at all. This was basically the raw footage taken from these dashcams all over the states.”
- [18:59] – Jason: “There's not that many hacks these days that I find to be surprising. But this one is pretty big.”
- [21:11] – Joseph: “Some of the dash cams are clearly owned by people who are either visiting or work at very sensitive U.S. military Intelligence Agency facilities ... The hacker was then able to find the unredacted, the unblurred footage from that driver in the hacked AWS bucket.”
- [31:27] – Sam: “Almost all of them, all but one, said, give him the maximum, Give him life. Like, there's no amount of time that you can give him that would be too much.”
- [41:11] – Sam: “One woman was targeted when she was very young and she kind of whipped around and looked right at him and said, hey, pedophile.”
Timestamps for Key Segments
- Nexar Dashcams, Public Map, and Data Sales – 02:28 to 05:45
- Nexar/Flock Partnership and Surveillance Parallels – 05:45 to 08:19
- The Hack: Access, Data Exposure, User Impact – 12:00 to 18:59
- National Security and High-Sensitivity Footage – 19:41 to 22:38
- Corporate Data Customers (including Niantic/Saudi angle) – 22:47 to 24:00
- Summary, Takeaways, and User Advice – 25:09
- Girls Do Porn: Sentencing Hearing Impressions – 30:51 to 37:44
- Victim Impact Statements & New Revelations – 38:18 to 42:57
- The Sentencing Moment – 43:09 to 45:18
- Aftermath, Justice, and Reflection – 46:00 to 49:30
Conclusion
This episode delivers in-depth investigative stories blending tech, privacy, security, and hard-hitting legal reporting. The Nexar hack exposes the hidden risks of surveillance technology even in everyday tools, while the Girls Do Porn trial coverage closes a years-long saga of accountability and resilience. The 404 Media team’s blend of expertise, empathy, and real investigative muscle sets the episode apart for listeners keen to understand how technology truly shapes—and sometimes endangers—lives.
