Technology
How surveillance tech led police to accuse the wrong person
NEWYou can now listen to Fox News articles!
Most people never expect a knock on the door from a police officer to flip their life upside down. Yet that is exactly what happened to Chrisanna Elser in the Denver area of Colorado, near the small towns of Bow Mar and Columbine Valley.
An officer from the Columbine Valley Police Department arrived at her home and accused her of stealing a $25 package from a porch in the neighboring town of Bow Mar, Colorado.
The officer said surveillance technology pointed directly to her vehicle, a forest green Rivian R1T electric pickup truck. But Chrisanna insists she never stole anything.
What followed became a real-world lesson in modern surveillance. Doorbell cameras, license plate readers and phone location data suddenly became evidence in a case she had to fight herself.
CALIFORNIA PORCH PIRATE CAUGHT STEALING SURVEILLANCE CAMERAS INSTALLED TO CATCH HIM
Flock cameras are used in towns across the nation as license plate readers. A Colorado woman was accused of porch theft after police relied on surveillance tech, including Flock cameras, that incorrectly linked her vehicle to the scene. (Lori Van Buren/Albany Times Union via Getty Images)
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
The moment the accusation began
Chrisanna recently joined me on my Beyond Connected podcast to walk through the moment everything started. She remembers the day clearly. “So I laid down because I had a headache and my husband came in and said, there’s a police officer here for you.”
The officer told her a package had been stolen from a home roughly 1.3 miles away in Bow Mar, Colorado. The officer who confronted her was Sgt. Jamie Milliman of the Columbine Valley Police Department, which provides policing services for both Columbine Valley and Bow Mar.
He believed she was responsible. The accusation was based on surveillance tools used around the area. According to the officer, Flock license plate reader cameras had captured her forest green Rivian driving through Bow Mar between 11:52 a.m. and 12:09 p.m. on the day of the theft.
Bodycam footage captured the officer describing the town’s monitoring network. “You can’t get a breath of fresh air in or out of that place without us knowing.”
Chrisanna said she tried to show the officer evidence that she had nothing to do with the theft. But she says he would not review it. “And basically, he just continued to start with that. I was lying to him. Never lied to him once.”
Instead, the officer issued a summons ordering her to appear in court in Jefferson County, Colorado.
The porch camera video that sparked the case
Chrisanna later found the video that triggered the accusation. Neighbors had posted the porch camera footage on the community app Nextdoor while trying to identify the thief. At first, she could understand why the police thought the suspect resembled her. “When I saw the video from far away, I was like, wow, I guess that kind of looks like me.”
But the closer she examined the footage, the more differences she noticed. “She was significantly younger, and she had a bit of a shaved underside under her head.” The suspect ran away from the house and disappeared off camera.
Importantly, the person in the video ran away on foot and did not get into any vehicle, something that conflicted with the police theory involving Elser’s truck. Still, the investigation continued.
COLORADO WOMAN CHASES DOWN ‘PORCH PIRATE’ AND SHAMES HER ON VIDEO
Chrisanna Elser’s situation highlights how surveillance tools can generate leads but still require human verification to avoid mistakes. (Antranik Tavitian/Bloomberg via Getty Images)
What a Flock camera actually is
One of the technologies involved in the investigation was a Flock camera. Flock cameras are automated license plate reader systems made by the company Flock Safety. Cities and neighborhoods across the United States install them at intersections and neighborhood entrances.
They automatically capture:
- License plate numbers
- Vehicle color and approximate vehicle type
- Date, time and location
Police departments can search the camera network to see when a vehicle passed certain locations. In Bow Mar and Columbine Valley, Colorado, the cameras are used by the Columbine Valley police to help identify vehicles connected to investigations.
The systems are designed to help solve crimes such as stolen vehicles, kidnappings and hit-and-run cases. But they generate investigative leads, not proof.
Chrisanna’s case shows what can happen when technology is treated as a conclusion rather than a starting point.
The overlooked camera that could have cleared her
Chrisanna began doing something she never expected. She started investigating the accusation herself. While reviewing the evidence, she discovered something critical. Her truck had been parked directly in front of another Flock surveillance camera controlled by the town of Bo Mar during the entire time police claimed she committed the theft.
“Actually, my truck was parked right in front of a Flock camera in my neighbor’s driveway the whole time.” If investigators had reviewed that camera first, the case might have ended immediately.
The hidden phone feature that helped prove her innocence
Chrisanna also discovered another piece of evidence hiding in her own phone. It was a feature called Google Location Timeline.
The setting tracks where your phone travels if location history is enabled. “Anywhere your phone is, if you have your timeline turned on, it will track you,” Chrisanna said. In her case, it helped reconstruct exactly where she had been that day.
She later discovered the data showed she had visited a tailor just outside of Bow Mar for a noon appointment located more than a quarter mile from the theft location.
A Columbine Valley Police officer questions Chrisanna Elser on her front porch near Bow Mar, Colorado. Police later dropped the case after reviewing new evidence showing Elser’s vehicle was parked during the alleged crime. (Columbine Valley Police Department)
How Chrisanna built the timeline that cleared her
Chrisanna gathered multiple sources of proof to show where she had actually been.
Her evidence included:
• Google Location Timeline data
• Flock camera images
• Photos from other stops she made that day
• Video from her own vehicle’s onboard cameras and GPS system
She built a timeline and sent the evidence to the police. Eventually, the Columbine Valley Police Chief, Bret Cottrell, reviewed the information and responded by email. Chrisanna read the message she received.
“Hi, Anna. After reviewing the evidence you’ve provided. (nicely done btw), we have voided the summons that was issued. We have double checked with Jefferson County courts, and the case was not yet entered into the system; therefore, there is no record on file. Thank you for getting back to us with the evidence you said you would be able to provide. Sincerely, Bret”.
After roughly two weeks, the summons was voided, and the case was dropped. The actual porch theft was never solved, Chrisanna said. The officer involved later received a formal reprimand and was ordered to complete additional training, according to internal police documents.
We reached out to the Columbine Valley Police Department for comment, but did not receive a response before our deadline.
How someone might obtain Flock camera footage
Many people assume they cannot access surveillance footage used by police. In some cases and jurisdictions, they can. For example, in Colorado, residents can request certain government records under the Colorado Open Records Act (CORA), the state’s public-records law similar to the federal Freedom of Information Act.
Chrisanna said her husband suggested requesting the footage through public records laws. “If the city, if they’re using any surveillance on you at all, you can do a Freedom of Information Act.” While FOIA technically applies to federal agencies, people often use the term to describe public-records requests more broadly.
Steps to request Flock camera footage
- Identify the police department operating the cameras
- Submit a public records or FOIA request
- Include the date, time and location you need
- Request related bodycam or license plate reader records if necessary
Access rules vary by state and department. Still, the footage may be available when cameras are owned by a city or town.
Technology still needs human judgment
Chrisanna does not believe surveillance tools should disappear. But she believes they need clear guardrails. “They are a useful tool, but they are not a replacement for police work as it was in this case,” she said.
Technology can help solve crimes and protect communities. Yet when investigators rely on it without verifying the facts, mistakes can happen.
DOORBELL-CAM COMPANY RING PARTNERS WITH 405 POLICE AGENCIES ACROSS US TO SHARE FOOTAGE, FIGHT CRIME
License plate reader data and doorbell footage led police to accuse the wrong suspect before new evidence cleared her. (Chip Somodevilla/Getty Images)
How to turn Google Location Timeline on or off
Chrisanna used Google’s Location Timeline as part of the evidence that helped prove where she was on the day of the alleged theft. Many people do not realize this feature exists, but you can check it anytime through Google Maps.
Steps to check Google Location Timeline
- Open the Google Maps app
- Tap your profile icon in the top right
- Select Your Timeline
- Tap the three-dot menu or More
- Tap Location & privacy settings
- Turn Timeline / Location History on or off
If enabled, Google Maps may store a record of places your phone has been. Some people use it to remember trips or travel routes. Others prefer to turn it off for privacy. Either way, the data can become important if you ever need to prove where you were at a certain time.
Take my quiz: How safe is your online security?
Think your devices and data are truly protected? Take this quick quiz to see where your digital habits stand. From passwords to Wi-Fi settings, you’ll get a personalized breakdown of what you’re doing right and what needs improvement. Take my Quiz here: Cyberguy.com.
Kurt’s key takeaways
Most people assume surveillance protects them. Doorbell cameras catch porch pirates. License plate readers track stolen cars. Phone location data helps people retrace trips. But Chrisanna’s experience reveals another side of the technology. Data can suggest conclusions before investigators verify them. And when that happens, the person accused may have to gather their own evidence. Her takeaway is simple. “If they have evidence on you, you should have evidence on yourself.” For more of Chrisanna’s story and the full conversation, you can listen to or watch the complete episode on the Beyond Connected podcast at getbeyondconnected.com.
Let me leave you with this question. If technology ever pointed the finger at you tomorrow, would you have the data needed to prove where you really were? Let us know by writing to us at Cyberguy.com.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
Sign up for my FREE CyberGuy Report
Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox. Plus, you’ll get instant access to my Ultimate Scam Survival Guide – free when you join my CYBERGUY.COM newsletter.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Native Instruments Komplete 26 adds weird new synths and experimental piano sounds
The latest version of Native Instruments’ Komplete music production bundle is here with 62 new additions, including the wonderfully weird Absynth 6. Komplete 26 comes in several flavors, starting with three $99 Select bundles: Beats, Band, and Electronic. Prices jump pretty steeply from there, with Standard costing $549, Ultimate costing $1,249, and the Collector’s Edition priced at an eye-watering $1,949. You save some money if you’re upgrading from Komplete 15 (and yes, they switched from sequential numbers to years for 2026), but upgrading the Collector’s Edition will still set you back $399.
Komplete 26 Standard should satisfy all but the most demanding producers. Absynth 6 and Massive X cover most of your synth needs. Kontakt 8 is the industry standard for sample-based instruments covering orchestras, drums, choirs, and more. It also has tools for sequencing and building chord progressions if you need a little creative inspiration. There’s also Guitar Rig 7 Pro for effects and amp simulations. Plus, Komplete comes with mixing and mastering plugins from iZotope, including Ozone 12, Neutron 5, and Nectar 4.
Upgrading from the Standard Bundle to the Ultimate or Collectors does get you new additions like Claire and Claire: Avant, a pair of sampled Steinway D grand piano instruments that cover both traditional acoustic tones and experimental textures. There’s also a host of additions, like LCO Producer Strings and Moments: Vocal Clouds, that are targeted at score work. Of course, all those additional sampled instruments and expansion packs add to the download size, with the Collector’s Edition weighing in at 1.6 TB.
Technology
SIM swap scam drained Florida woman’s bank account in minutes
NEWYou can now listen to Fox News articles!
You’re at home, scrolling through your phone like any other night. Suddenly, nothing works. Texts stop, calls fail and alerts disappear. That’s how it started for Florida woman Patricia Escriva.
She didn’t lose her phone. She lost control of her phone number. And within minutes, someone else was using it to break into her accounts.
“I realized that I had nothing,” Escriva said. “Either you get a text message, a WhatsApp message, an email or a phone call. I had nothing.” That silence was the first warning.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
IS YOUR PHONE HACKED? HOW TO TELL AND WHAT TO DO
SIM swap scams target a victim’s phone number, allowing hackers to intercept verification codes and move quickly through linked accounts. (Kurt “CyberGuy” Knutsson)
How a normal night turned into chaos
Escriva shared her experience on my Beyond Connected podcast at getbeyondconnected.com, where she walked through how quickly everything unraveled.
Escriva was babysitting when her phone suddenly went quiet. No notifications. No signal. It felt off right away.
She connected to Wi-Fi to check what was going on. That’s when everything hit at once. “The first one was, you added a new device to your account,” she said. “And then two seconds later, you just changed your password.”
Then came the financial alerts. “Let me tell you, my heart stopped,” she said. “I start getting emails like $1,500, $800.”
Within minutes, someone had taken control of her accounts and started spending. That speed is what makes this type of attack so dangerous.
What is a SIM swap scam?
What happened to Patricia is known as a SIM swap scam. A SIM swap scam is a type of identity theft that targets your phone number. This can happen with both physical SIM cards and eSIMs, since the attack focuses on your number, not your device.
Here’s how it usually works:
- A scammer gathers your personal data online
- They contact your mobile carrier and pretend to be you
- They convince the carrier to move your number to their device
- Once your number is transferred, they receive your security codes
That last step is the key. Many accounts rely on text message codes for login security. Once a hacker controls your number, they can reset passwords and take over accounts fast. In some cases, accounts are drained within hours.
Why do these SIM swap scams move so fast?
Once your number is in the wrong hands, everything connected to it becomes vulnerable. Email accounts. Bank logins. Payment apps. Hackers don’t waste time. They move quickly before you even realize what’s happening.
In Escriva’s case, the damage started immediately. “They were using my money… from their checking account to pay the credit cards to keep using the credit card,” she said. Even after reporting the issue, it took days to regain control of her number. “They took three days in order to get my phone number…back,” she said.
FBI WARNS OF DANGEROUS NEW ‘SMISHING’ SCAM TARGETING YOUR PHONE
Patricia Escriva recalls the moment her phone went silent and her accounts were taken over in a SIM swap scam. (Kurt “CyberGuy” Knutsson)
SIM swap scam warning signs you should never ignore
SIM swap scams don’t always start with obvious red flags. The first sign can feel small.
Here are signals you should never ignore:
- Your phone suddenly loses service
- You can’t send or receive calls or texts
- You get alerts about new devices or password changes
- You stop receiving verification codes
Escriva now urges people to act fast when something feels off. “If you see you have nothing going on on your phone, make a phone call,” she said. “If that phone call doesn’t go through… you’re being hacked.”
While Patricia lost thousands of dollars to the scammer, her bank ultimately restored all of her money.
What to do if you’re hit by a SIM swap scam
If your phone suddenly stops working without warning, act quickly:
- Call your mobile carrier from another phone and lock your number
- Ask for a SIM lock or port-out freeze immediately
- Contact your bank and stop any transactions
- Change passwords for your email and financial accounts
- Turn on alerts for suspicious activity
- Report the incident to your carrier and local police
Ways to stay safe from a SIM swap scam
You can’t control every data breach or leak. But you can make it much harder for someone to take over your number.
1) Lock down your mobile account
Call your carrier and ask for a SIM lock or port-out PIN. This adds a layer of protection before your number can be moved.
2) Stop relying on text codes
Switch important accounts to an authenticator app or security key. Text messages are the weak link in SIM swap attacks.
3) Use strong, unique passwords
Every account should have its own password. A password manager can help you generate and store them securely. Check out the best expert-reviewed password managers of 2026 at CyberGuy.com.
4) Turn on account alerts
Enable notifications for logins, password changes and transactions. The faster you spot suspicious activity, the better.
IF SOMEONE GETS INTO YOUR EMAIL, THEY OWN EVERY ACCOUNT YOU HAVE. THESE 3 MOVES LOCK THEM OUT FOR GOOD
A SIM swap scam can give criminals access to text message codes used to reset passwords and take over financial accounts. (Felix Zahn/Photothek)
5) Limit your data exposure
Your personal information is often available on data broker sites. Removing it with a data removal service reduces what scammers can use against you. Check out my top picks for data removal services and get a free scan to find out if your personal information is already out on the web by visiting CyberGuy.com.
6) Watch for phishing and malicious links
Scammers often gather the information they need through fake emails or texts. Using strong antivirus software can help detect malicious links, fake websites and suspicious downloads before they compromise your data. Get my picks for the best 2026 antivirus protection winners for your Windows, Mac, Android and iOS devices at CyberGuy.com.
7) Consider identity theft protection
These services can monitor your personal data, alert you to suspicious activity and help you recover more quickly if your information is misused. They can also flag when your data appears in known breaches. See my tips and best picks on Best Identity Theft Protection at CyberGuy.com.
8) Act immediately if your phone goes silent
Don’t wait. Use another phone and call your carrier and bank right away. Lock everything down as fast as possible.
Kurt’s key takeaways
Patricia Escriva’s story is a reminder of how quickly things can spiral out of control. One moment, everything feels normal. Next, your digital life is out of your hands. Her experience also shows something else. Speed matters. Awareness matters. The sooner you act, the more you can limit the damage. Scammers are getting better at impersonation. That means protecting your phone number is now just as important as protecting your passwords. You can hear Patricia walk through her entire story step by step on my Beyond Connected podcast at getbeyondconnected.com, including what she wishes she had known before it happened.
CLICK HERE TO DOWNLOAD THE FOX NEWS APP
If your phone suddenly lost service right now, would you know exactly what to do next? Let us know by writing to us at CyberGuy.com.
Sign up for my FREE CyberGuy Report
- Get my best tech tips, urgent security alerts and exclusive deals delivered straight to your inbox.
- For simple, real-world ways to spot scams early and stay protected, visit CyberGuy.com – trusted by millions who watch CyberGuy on TV daily.
- Plus, you’ll get instant access to my Ultimate Scam Survival Guide free when you join.
Copyright 2026 CyberGuy.com. All rights reserved.
Technology
Google Home’s Gemini AI can handle more complicated requests
Google Home users can now ask Gemini to complete more complex, multi-step tasks and combine multiple tasks in a single command. Google has updated Gemini for Home to Gemini 3.1, which it says will improve the smart home assistant’s ability to interpret and act on requests. The upgrade will also make Gemini for Home better at handling recurring and all-day events and allow users to “move around” upcoming events.
In addition to the Gemini upgrade, Google also announced improvements to the camera experience, new automation capabilities, and two public previews: Ask Home on Web and a new notification feature. Ask Home on Web will allow Google Home users to manage their smart home from a computer, including searching camera history with natural language, checking on devices, and creating automations. Google is also releasing a public preview for “improved and expanded notifications” that include “quick action” buttons that can be used for device control directly in the notification.
-
Movie Reviews9 minutes agoMovie Review – Mortal Kombat II (2026)
-
World21 minutes agoTed Turner, TV Mogul and Philanthropist, Dies at 87
-
News27 minutes agoTennessee Republicans Unveil New Congressional Map Carving Up Majority-Black House District
-
Politics33 minutes agoA Look Inside the Case That Enshrined Political Power for Billionaires
-
Business39 minutes agoHoward Lutnick Faces Questions From Congress About Epstein Ties
-
Science45 minutes agoHer Self-Experiment with Drug Detox Almost Broke Her
-
Culture1 hour agoBook Review: ‘From Life Itself,’ by Suzy Hansen
-
Lifestyle1 hour agoHaving Trouble Choosing the Right White for Your Wedding? This Color Analyst Can Help.