COP BLOCKED: Uber app thwarted arrests of its drivers by fooling police with 'ghost cars'

Ride-sharing tech bros accused of shady behavior shocker


Not content with cultivating a toxic, sexist and hostile corporate culture, Uber is on a collision course with cops worldwide.

The ride-sharing app maker produced – and, for years now, used – a software tool called Greyball that thwarts attempts by police to arrest or fine Uber drivers wherever the car-hailing service is restricted or banned from operating.

According to The New York Times, Greyball prevents officers from requesting Uber rides to collar or ticket drivers when they arrive for a pickup. Greyball is activated on accounts that belong to investigators: when enough "signals" were raised flagging the user as a cop, Uber enables Greyball mode for their account. Arresting a driver is presumably a pretty strong negative signal for your account.

Multiple employees at San Francisco-based Uber confirmed Greyball displayed fake "ghost" cars on the map in the smartphone application to fool cops into thinking the software was operating as normal. In reality, requests for rides would be assigned to these non-existent vehicles that would never show up, or if a real driver was selected, the driver would be told the ride was canceled due to the user breaking the app's terms and conditions.

The tool is, we're told, used by Uber in cities where the operation of Uber's service is largely restricted or outlawed, and therefore likely to draw the plod's attention. In one such city, Portland, in Oregon, US, the use of the tool was uncovered by authorities in 2014, when Uber was still wrangling with the city over whether it could operate its UberX service legally.

Today's yarn from the NYT claims that even after Uber struck a deal to operate in Portland, the Greyball code was used in that city and others around the globe where Uber operated under close scrutiny. In other words, its use is allegedly widespread – in Boston, Paris and Las Vegas, and Australia, China, Italy and South Korea, and beyond – and, basically, it may be seen as a mass obstruction of justice. The tool was reportedly cleared for use by Uber's legal team.

Uber told The Register that Greyball simply stamps out abusers of its platform, rival app makers, dangerous passengers, and, er, law enforcement: "This program denies ride requests to fraudulent users who are violating our terms of service—whether that’s people aiming to physically harm drivers, competitors looking to disrupt our operations, or opponents who collude with officials on secret ‘stings’ meant to entrap drivers.”

Chalk this up as one more public relations headache for Uber, which is already dealing with the fallout from a former employee's detailed account of the pervasive sexual harassment at Uber and management's turning of a blind eye to complaints.

And also last month Alphabet filed suit accusing Uber of stealing its self-driving car technology. And shortly after that, a video surfaced of CEO Travis Kalanick berating an Uber driver who complained about falling fares. ®

PS: Uber's senior veep Amit Singhal has left, veep for product and growth Ed Baker has quit, security engineer and renowned car hacker Charlie Miller has quit, and PRs are now pitching startups as "Lyft but for..." not "Uber but for..."

Similar topics


Other stories you might like

  • Battlefield 2042: Please don't be the death knell of the franchise, please don't be the death knell of the franchise

    Another terrible launch, but DICE is already working on improvements

    The RPG Greetings, traveller, and welcome back to The Register Plays Games, our monthly gaming column. Since the last edition on New World, we hit level cap and the "endgame". Around this time, item duping exploits became rife and every attempt Amazon Games made to fix it just broke something else. The post-level 60 "watermark" system for gear drops is also infuriating and tedious, but not something we were able to address in the column. So bear these things in mind if you were ever tempted. On that note, it's time to look at another newly released shit show – Battlefield 2042.

    I wanted to love Battlefield 2042, I really did. After the bum note of the first-person shooter (FPS) franchise's return to Second World War theatres with Battlefield V (2018), I stupidly assumed the next entry from EA-owned Swedish developer DICE would be a return to form. I was wrong.

    The multiplayer military FPS market is dominated by two forces: Activision's Call of Duty (COD) series and EA's Battlefield. Fans of each franchise are loyal to the point of zealotry with little crossover between player bases. Here's where I stand: COD jumped the shark with Modern Warfare 2 in 2009. It's flip-flopped from WW2 to present-day combat and back again, tried sci-fi, and even the Battle Royale trend with the free-to-play Call of Duty: Warzone (2020), which has been thoroughly ruined by hackers and developer inaction.

    Continue reading
  • American diplomats' iPhones reportedly compromised by NSO Group intrusion software

    Reuters claims nine State Department employees outside the US had their devices hacked

    The Apple iPhones of at least nine US State Department officials were compromised by an unidentified entity using NSO Group's Pegasus spyware, according to a report published Friday by Reuters.

    NSO Group in an email to The Register said it has blocked an unnamed customers' access to its system upon receiving an inquiry about the incident but has yet to confirm whether its software was involved.

    "Once the inquiry was received, and before any investigation under our compliance policy, we have decided to immediately terminate relevant customers’ access to the system, due to the severity of the allegations," an NSO spokesperson told The Register in an email. "To this point, we haven’t received any information nor the phone numbers, nor any indication that NSO’s tools were used in this case."

    Continue reading
  • Utility biz Delta-Montrose Electric Association loses billing capability and two decades of records after cyber attack

    All together now - R, A, N, S, O...

    A US utility company based in Colorado was hit by a ransomware attack in November that wiped out two decades' worth of records and knocked out billing systems that won't be restored until next week at the earliest.

    The attack was detailed by the Delta-Montrose Electric Association (DMEA) in a post on its website explaining that current customers won't be penalised for being unable to pay their bills because of the incident.

    "We are a victim of a malicious cyber security attack. In the middle of an investigation, that is as far as I’m willing to go," DMEA chief exec Alyssa Clemsen Roberts told a public board meeting, as reported by a local paper.

    Continue reading

Biting the hand that feeds IT © 1998–2021