+0.35 US Customs Database Of Traveler Photos Was Hacked And Stolen (www.buzzfeednews.com S:+0.50 )
825 points by pseudolus 2454 days ago | 198 comments on HN | Moderate positive Editorial · v3.7 · 2026-02-28 12:19:42
Summary Privacy & Surveillance Advocates
BuzzFeed News investigative article reporting on a US Customs and Border Protection data breach exposing traveler photos and license plates to unauthorized access. The piece directly advocates for privacy rights and government accountability, featuring prominent criticism from ACLU and Congressional leaders calling for investigations and limits on surveillance expansion, demonstrating strong alignment with UDHR provisions on privacy, freedom of expression, and security of person.
Article Heatmap
Preamble: +0.35 — Preamble P Article 1: +0.25 — Freedom, Equality, Brotherhood 1 Article 2: ND — Non-Discrimination Article 2: No Data — Non-Discrimination 2 Article 3: +0.45 — Life, Liberty, Security 3 Article 4: ND — No Slavery Article 4: No Data — No Slavery 4 Article 5: ND — No Torture Article 5: No Data — No Torture 5 Article 6: +0.25 — Legal Personhood 6 Article 7: +0.20 — Equality Before Law 7 Article 8: +0.35 — Right to Remedy 8 Article 9: ND — No Arbitrary Detention Article 9: No Data — No Arbitrary Detention 9 Article 10: +0.25 — Fair Hearing 10 Article 11: ND — Presumption of Innocence Article 11: No Data — Presumption of Innocence 11 Article 12: +0.75 — Privacy 12 Article 13: +0.40 — Freedom of Movement 13 Article 14: +0.20 — Asylum 14 Article 15: ND — Nationality Article 15: No Data — Nationality 15 Article 16: ND — Marriage & Family Article 16: No Data — Marriage & Family 16 Article 17: ND — Property Article 17: No Data — Property 17 Article 18: ND — Freedom of Thought Article 18: No Data — Freedom of Thought 18 Article 19: +0.62 — Freedom of Expression 19 Article 20: ND — Assembly & Association Article 20: No Data — Assembly & Association 20 Article 21: +0.30 — Political Participation 21 Article 22: ND — Social Security Article 22: No Data — Social Security 22 Article 23: ND — Work & Equal Pay Article 23: No Data — Work & Equal Pay 23 Article 24: ND — Rest & Leisure Article 24: No Data — Rest & Leisure 24 Article 25: ND — Standard of Living Article 25: No Data — Standard of Living 25 Article 26: ND — Education Article 26: No Data — Education 26 Article 27: ND — Cultural Participation Article 27: No Data — Cultural Participation 27 Article 28: +0.25 — Social & International Order 28 Article 29: +0.25 — Duties to Community 29 Article 30: +0.30 — No Destruction of Rights 30
Negative Neutral Positive No Data
Aggregates
Editorial Mean +0.35 Structural Mean +0.50
Weighted Mean +0.36 Unweighted Mean +0.34
Max +0.75 Article 12 Min +0.20 Article 7
Signal 15 No Data 16
Volatility 0.15 (Medium)
Negative 0 Channels E: 0.6 S: 0.4
SETL +0.37 Editorial-dominant
FW Ratio 57% 25 facts · 19 inferences
Evidence 39% coverage
8H 7M 16 ND
Theme Radar
Foundation Security Legal Privacy & Movement Personal Expression Economic & Social Cultural Order & Duties Foundation: 0.30 (2 articles) Security: 0.45 (1 articles) Legal: 0.26 (4 articles) Privacy & Movement: 0.45 (3 articles) Personal: 0.00 (0 articles) Expression: 0.46 (2 articles) Economic & Social: 0.00 (0 articles) Cultural: 0.00 (0 articles) Order & Duties: 0.27 (3 articles)
HN Discussion 20 top-level · 22 replies
wil421 2019-06-10 20:36 UTC link
CBP database with images of travelers and license plates breached via a subcontractor with access to CBPs network. Updates to follow.

Nothing else in the article.

jonahhorowitz 2019-06-10 21:10 UTC link
Who could have predicted this would happen?
axaxs 2019-06-10 21:10 UTC link
> On May 31, 2019, CBP learned that a subcontractor, in violation of CBP policies and without CBP’s authorization or knowledge, had transferred copies of license plate images and traveler images collected by CBP to the subcontractor’s company network

> CBP ... is closely monitoring all CBP work by the subcontractor

What. In the private sector, they'd have been fired and probably legal action levelled against them. The CBP's punishment for this is 'monitoring'? Please tell me I'm reading this wrong...

utefan001 2019-06-10 21:15 UTC link
The sad truth is Congress is the biggest offender of poor network security practices. Every time they bring in Equifax, DHS, etc to explain why they didn't practice basic IT security due diligence or due care I am reminded of the time smart people were hired to implement basic network security for Congress. Once they realized Joe in IT (who was hired to keep hackers out) can see Congressman Bob has a foot fetish, fish fetish, whatever, Congress told IT to turn everything off.
chuckgreenman 2019-06-10 21:16 UTC link
If only someone could have seen this coming, you know, outside of the thousands of people that saw this coming. This is just one of many reasons why mass surveillance is a terrible.
lsllc 2019-06-10 21:17 UTC link
Rule #1 about databases: It will be hacked. Rule #2: see rule #1
souterrain 2019-06-10 21:44 UTC link
If CBP is not directly forthcoming with facts relating to the breach (specifically, whose information was unlawfully taken from the CBP production network) how does one seek redress for the harms created by the actions of the contractor?
txcwpalpha 2019-06-10 21:45 UTC link
This is yet another reminder that managing the security of your company's third party contractors is just as important as managing your own company's security. Security is a game of weakest links, and it wouldn't have mattered if CBP's internal security was the best in the world if they were allowing access to a third party that doesn't have good security.

It is naturally very difficult to enforce security mandates on a company that isn't your own, but I feel that this is one of the best ways we can improve security overall in our society: companies need to start requiring that everyone they do business with have a strong, independently certified security program, or else no contract will be signed. This is already done for things like data center contracting, but it should be much more widespread and encompass every type of b2b deal.

lifeisstillgood 2019-06-10 22:18 UTC link
Can I play devils advocate here?

This is, of course, a serious breach and there will and should of course be consequences for the negligent parties

but

I am struggling to see the threat model being faced here.

biometric data is just a username. I flash my face around all day, and am careless as to where I leave my thumbprint.

The loss of so many photos and names is unlikely to have national level consequences (Compare this to say the Office Of Personnel management breach from some years back - that has horrible implications for US National security for decades) and the personal level consequences are ... hard to see

What this does underline is that we are outrageously careless as an industry with our data (comparable to early industrial "pollution" as Schneier points out). And it is not going to get better without a) career and business ending consequences b) new ways to store / secure data c) a new way of thinking about who owns and what is personal data

Personally I think we need a new form of intellectual property (just as we are trying to work out what kind of company FAANG are (not telcos, not newspapers, what is a platform?) we need to ask what is personal data

This comment is presumed under law to be my property, my copyright. I might license that property away (dunno never read HN T&Cs) but it is mine. But google and apple and others will track that I sat down at a certain time and place to write it, my ISP will see when I sent to which servers.

All of that data is also created by my conscious actions - should that data not also be my property. And if need be licensed - and compensated for its use?

And when (if) my data is held - then we should presume that it can be accessed by my agents for my benefit (from spending patterns to heart data). I would argue that Sometimes surveillance can be good for us - but only in ways similar to doctors knowing more about me can be good for me - the entire industry of medicine has individual interests at its heart and took a long time to get there.

We are heading in that direction (perhaps) but till we get there, carelessness will be the cheapest option, surveillance always bent agansit is (by state or other actors). We should rail against this stupid dumb breach, but punishing the "bad guys" is not even the first step on the road.

If I can make a bad analogy - It's not one incident that people got sick from one chef badly cooking chicken - it's we need to look at factory farming and meat consumption and healthy eating and marketing bias as a whole.

cjhanks 2019-06-10 22:29 UTC link
The only way to prevent hackers from getting access to databases that contain our names, picture, and license plate number - is to never create such a database.
savethefuture 2019-06-10 22:34 UTC link
The photos were transferred to a subcontractor’s network and later stolen through a “malicious cyberattack,” a CBP spokesperson told TechCrunch in an email.

Anyone think they approved the security of that subcontractor before giving sensitive information to them?

More importantantly, why is that type of data leaving CBP in the first place?

DigitalVerse 2019-06-10 22:46 UTC link
Don't worry folks, I'm sure this won't hinder the CBP and other related agencies from continuing to roll out systems that capture ever more of our data.
projectileboy 2019-06-10 23:06 UTC link
I’ll just keep saying this, and getting dismissed by everyone I know - any data security discussion around a centralized data store that doesn’t begin with the recognition that that data store will be compromised, is a discussion that is just a joke.
jacquesm 2019-06-10 23:16 UTC link
You can outsource work, you can't outsource responsibility. It will likely be a long time before the various powers that be really get this.
Canada 2019-06-10 23:28 UTC link
Great job, thanks guys. Shouts to NSA and the whole security industrial industrial complex for looking out for us. Glad to see all the research and 0day hoarding paid off. Really appreciate it.
lr 2019-06-10 23:39 UTC link
Quote from the article:

“There should never have been the ability to download a database like this off of government servers.”

Sorry that I don't have a ton of links to support this claim, but "believe me" (as our Commander-in-chief would say) that the US Government would cease to function if it were not for subcontractors (read, private companies) performing tasks on behalf of the government. Personally, I don't agree with this way of our government doing business, but that is the way it is.

When I was in college, I worked for an archeology lab, and our lab was the subcontractor, of the subcontractor, of the contractor that had contracted to provide a service to the USACE (US Army Corps of Engineers). And every way along the way, money was skimmed off of the top. It's just "the American way" of doing business.

People lament regulation all the time. I have a feeling the executives of Ingersoll Rand love it every time a new regulation is put into place.

Follow the money.

noonespecial 2019-06-10 23:39 UTC link
They've helped themselves to what seems to be limitless legal power as well as a functionally infinite budget... and still this type of incident doesn't surprise us in the least. Everyone just expects them to be one of the least competent actors in the space. And they don't disappoint. Hmmm.
koolba 2019-06-10 23:45 UTC link
> “CBP learned that a subcontractor, in violation of CBP policies and without CBP’s authorization or knowledge, had transferred copies of license plate images and traveler images collected by CBP to the subcontractor’s company network,” said an agency statement.

How long will it take the general public and elected officials to understand that the only authorization that matters for digital data is the actual implementation. Policies, legalese, mandates or any other agreements are meaningless.

If the data can be get at from or transferred to outside of a controlled environment, it will.

nihonde 2019-06-10 23:58 UTC link
Just another reminder that there is no accountability left in America, and you reap what you sow. If you want a society that is accountable, you need to start with a culture that values honor and takes shame seriously. You can’t impose a sense of honor from the outside without building it slowly from within, any more than you can impose respect without earning it.

If you ignore these principles, you make room for people who lack self-worth, and those are the most destructive forces in a society because they have nothing to lose.

rdiddly 2019-06-11 01:50 UTC link
"First you say don't take your pictures. Then you say don't lose them in a breach. Make up your minds!"
melan13 2019-06-10 21:21 UTC link
anyone ? Why is a 3rd party given the ability to store such a large database to conduct such business ? They should at most store the last 3 months border documents, nothing older than this.
izzydata 2019-06-10 21:23 UTC link
That would imply that security is irrelevant. Maybe you should re-work your rule the say that it will attempt to be hacked. Therefore you should always worry about security.
txcwpalpha 2019-06-10 21:27 UTC link
Sounds like pretty standard PR legalese to me. I guarantee that the same is going to happen to the subcontractor (after a lengthy investigation, to be sure), but it's bad practice to go throwing around public legal threats, especially for the government which likely has a multi-hundred page contract with these people, and especially at such an early point in any investigations going on.
idlewords 2019-06-10 21:28 UTC link
Remember the time Experian got hacked and the CEO subsequently retired with a $90M payday? The private sector is just as consequence-free.
acdha 2019-06-10 21:30 UTC link
“In the private sector” covers a lot of ground and I have extreme skepticism about your faith in the process unfolding that way: ask yourself how many breaches you’ve been part of and whether anything more than a press release happened along with waiting for the news to die down. How many customers did Experian lose?

(In the enterprise software world, I can tell you how epic failure to perform on an 8+ figure contract unfolds: the sales guy takes a VP out to the next game so they can discuss it over drinks in the corporate box and nothing will change)

drtillberg 2019-06-10 22:04 UTC link
Not far off from what it turns out (after investigation) really happened![1]

[1] https://en.m.wikipedia.org/wiki/Imran_Awan

dpau 2019-06-10 22:09 UTC link
From the article: "The subcontractor's network was then hacked, though CBP said its own systems had not been compromised."

No, actually your system was compromised by allowing the subcontractor to copy the data to another, more insecure network.

morpheuskafka 2019-06-10 22:23 UTC link
They probably are doing some sort of critical service that can't be immediately stopped. That doesn't mean they will get contracts in the future or won't get legal action taken, but it takes time to review all that with the DOJ and decide how to proceed.
Macross8299 2019-06-10 22:28 UTC link
>I am struggling to see the threat model being faced here.

We don't really know the full details of the breach, but if the facial recognition database contained names in a column associated with pictures, that data can absolutely be leveraged and cross-referenced against other "fullz" for fraud that even passes a lot of online verification procedures.

megaremote 2019-06-10 22:44 UTC link
Ha. In the private sector, we discovered a vendor was using an actually health database with real users in it for testing their app. It was all covered up, with no monitoring, because we recently bought that vendor.
dsfyu404ed 2019-06-10 23:12 UTC link
Why is it terrible. Sure this has the potential to have negative consequences for the people who's data it was but as far as the government cares it's working fine.
a3n 2019-06-10 23:18 UTC link
At best, ads. At worst, ...
anigbrowl 2019-06-10 23:18 UTC link
You and a whole bunch of other people making the same extremely basic observation. It would be good if you would suggest some alternative strategies, since 'don't bother keeping that data' isn't a realistic option in this context.
ariwilson 2019-06-10 23:19 UTC link
Why does decentralization save you from compromise?
MrMorden 2019-06-10 23:26 UTC link
Compliance with NIST SP 800-53 is mandatory per statute and DHS policy. That system has an identified ISSO, ISSM, ISSPM, DAO, and AO who are responsible for authority to operate being given. If the paperwork is in place, a government employee signed off on that network's operation. If not, it doesn't have ATO and there's a government employee (the AO or CIO) responsible for allowing a such a network to be connected to government systems and store government-controlled information.
canada_dry 2019-06-10 23:28 UTC link
> requiring that everyone they do business with have a strong, independently certified security program

As a start how about requiring ISO 2700x security certification?

txcwpalpha 2019-06-10 23:28 UTC link
> Anyone think they approved the security of that subcontractor before giving sensitive information to them?

They almost certainly did, actually. FIPS [1] and FISMA [2] are pretty strict requirement for every company contracting with a government agency. IMO it's one of the rare situations where, at least conceptually, the federal government has done something right in terms of security.

Now whether FIPS/FISMA, and the people enforcing it, actually have any teeth or effectiveness is a different topic entirely.

1: https://en.wikipedia.org/wiki/Federal_Information_Processing...

2: https://en.wikipedia.org/wiki/Federal_Information_Security_M...

haberman 2019-06-11 00:01 UTC link
Isn't monetary liability a form of "outsourced responsibility"? I'm not understanding why damages from lawsuits are not sufficiently motivating the industry to take data breaches seriously. Maybe they just aren't awarding enough damages to change behavior?
EForEndeavour 2019-06-11 03:00 UTC link
Correct me if I'm being overly cynical, but this is an oft-repeated truism that is as useless as "the only winning move is not to play." It's technically the truth, but what are we supposed to do, revert all information systems to non-electronic media? What is the intended takeaway from this statement? If anything, it absolves data security efforts of responsibility by pointing out that there's always a chance of data breach as long as there is data.

That's trivially true, but the proper response to bad security is good security, not shutting down the whole system.

taneq 2019-06-11 03:31 UTC link
And this is the same group that can force you to give them your social media credentials on entry. Terrific.

Edit: Wait, just social media handles/account names, not login details. That's less ridiculous. My mistake.

maerF0x0 2019-06-11 05:01 UTC link
The goal isnt to prevent it in an absolute sense. The goal is to raise the cost to either above the value of the data contained therein or compared to other direct means, like in person espionage or military actions.
zxcb1 2019-06-11 06:16 UTC link
Single points of failure via centralization, comparable to monoculture in farming
Editorial Channel
What the content says
+0.75
Article 12 Privacy
High Advocacy Framing Coverage
Editorial
+0.75
SETL
ND

Article is primarily focused on privacy violations and strongly advocates for privacy protection against unauthorized government data collection and exposure

+0.70
Article 19 Freedom of Expression
High Advocacy Framing Coverage Practice
Editorial
+0.70
SETL
+0.37

Article is investigative journalism exemplifying freedom of opinion and expression through critical reporting on government surveillance practices and policy advocacy

+0.45
Article 3 Life, Liberty, Security
High Advocacy Framing Coverage
Editorial
+0.45
SETL
ND

Article directly engages with security of person by reporting on data breach that undermines travelers' personal integrity and security

+0.40
Article 13 Freedom of Movement
High Advocacy Framing Coverage
Editorial
+0.40
SETL
ND

Article critiques surveillance systems that restrict freedom of movement through biometric tracking and facial recognition of international travelers

+0.35
Preamble Preamble
High Advocacy Framing
Editorial
+0.35
SETL
ND

Article implicitly advocates for human dignity through critique of unauthorized data exposure and privacy violations, establishing case for rights protections

+0.35
Article 8 Right to Remedy
High Advocacy Coverage
Editorial
+0.35
SETL
ND

Article emphasizes need for effective remedies through Congressional investigation and oversight of the breach

+0.30
Article 21 Political Participation
High Advocacy Coverage
Editorial
+0.30
SETL
ND

Article advocates for public participation in government through Congressional oversight and calls for investigation of CBP data practices

+0.30
Article 30 No Destruction of Rights
High Advocacy Framing Coverage
Editorial
+0.30
SETL
ND

Article opposes government actions and policies that undermine recognized human rights to privacy, security, and freedom of movement

+0.25
Article 1 Freedom, Equality, Brotherhood
Medium Advocacy Coverage
Editorial
+0.25
SETL
ND

Article addresses equal treatment of all travelers affected by breach, implicitly affirming equal dignity and rights regardless of citizenship or status

+0.25
Article 6 Legal Personhood
Medium Advocacy Coverage
Editorial
+0.25
SETL
ND

Article addresses biometric data collection for legal identification, raising concerns about safeguards for recognition as person before law

+0.25
Article 10 Fair Hearing
Medium Advocacy Coverage
Editorial
+0.25
SETL
ND

Article reports Congressional calls for public hearings and investigation, supporting right to fair and public accountability

+0.25
Article 28 Social & International Order
Medium Advocacy Coverage
Editorial
+0.25
SETL
ND

Article advocates for social and international order that protects privacy rights and limits surveillance expansion

+0.25
Article 29 Duties to Community
Medium Advocacy Coverage
Editorial
+0.25
SETL
ND

Article emphasizes government's duty to community to protect privacy and exercise surveillance responsibility

+0.20
Article 7 Equality Before Law
Medium Advocacy Coverage
Editorial
+0.20
SETL
ND

Article implicitly addresses equal protection under law by criticizing unequal privacy safeguards in surveillance practices

+0.20
Article 14 Asylum
Medium Advocacy Coverage
Editorial
+0.20
SETL
ND

Article indirectly addresses asylum rights by noting all travelers crossing borders include vulnerable populations affected by breach

ND
Article 2 Non-Discrimination

Article does not address discrimination based on protected characteristics

ND
Article 4 No Slavery

Article does not address slavery or servitude

ND
Article 5 No Torture

Article does not address torture or cruel/inhuman treatment

ND
Article 9 No Arbitrary Detention

Article does not directly address arbitrary arrest or detention

ND
Article 11 Presumption of Innocence

Article does not address presumption of innocence or criminal justice procedures

ND
Article 15 Nationality

Article does not directly address right to nationality

ND
Article 16 Marriage & Family

Article does not address family or marriage rights

ND
Article 17 Property

Article does not directly address property rights

ND
Article 18 Freedom of Thought

Article does not address freedom of thought, conscience, or religion

ND
Article 20 Assembly & Association

Article does not directly address freedom of peaceful assembly

ND
Article 22 Social Security

Article does not address social security or economic rights

ND
Article 23 Work & Equal Pay

Article does not address labor rights or working conditions

ND
Article 24 Rest & Leisure

Article does not address right to rest and leisure

ND
Article 25 Standard of Living

Article does not address right to adequate standard of living

ND
Article 26 Education

Article does not address right to education

ND
Article 27 Cultural Participation

Article does not address right to participate in cultural life

Structural Channel
What the site does
+0.50
Article 19 Freedom of Expression
High Advocacy Framing Coverage Practice
Structural
+0.50
Context Modifier
ND
SETL
+0.37

BuzzFeed News platform provides free public access enabling bylined journalists to publish critical investigations on government surveillance

ND
Preamble Preamble
High Advocacy Framing

Not applicable for single article content

ND
Article 1 Freedom, Equality, Brotherhood
Medium Advocacy Coverage

Not applicable

ND
Article 2 Non-Discrimination

Not applicable

ND
Article 3 Life, Liberty, Security
High Advocacy Framing Coverage

Not applicable

ND
Article 4 No Slavery

Not applicable

ND
Article 5 No Torture

Not applicable

ND
Article 6 Legal Personhood
Medium Advocacy Coverage

Not applicable

ND
Article 7 Equality Before Law
Medium Advocacy Coverage

Not applicable

ND
Article 8 Right to Remedy
High Advocacy Coverage

Not applicable

ND
Article 9 No Arbitrary Detention

Not applicable

ND
Article 10 Fair Hearing
Medium Advocacy Coverage

Not applicable

ND
Article 11 Presumption of Innocence

Not applicable

ND
Article 12 Privacy
High Advocacy Framing Coverage

Not applicable

ND
Article 13 Freedom of Movement
High Advocacy Framing Coverage

Not applicable

ND
Article 14 Asylum
Medium Advocacy Coverage

Not applicable

ND
Article 15 Nationality

Not applicable

ND
Article 16 Marriage & Family

Not applicable

ND
Article 17 Property

Not applicable

ND
Article 18 Freedom of Thought

Not applicable

ND
Article 20 Assembly & Association

Not applicable

ND
Article 21 Political Participation
High Advocacy Coverage

Not applicable

ND
Article 22 Social Security

Not applicable

ND
Article 23 Work & Equal Pay

Not applicable

ND
Article 24 Rest & Leisure

Not applicable

ND
Article 25 Standard of Living

Not applicable

ND
Article 26 Education

Not applicable

ND
Article 27 Cultural Participation

Not applicable

ND
Article 28 Social & International Order
Medium Advocacy Coverage

Not applicable

ND
Article 29 Duties to Community
Medium Advocacy Coverage

Not applicable

ND
Article 30 No Destruction of Rights
High Advocacy Framing Coverage

Not applicable

Supplementary Signals
How this content communicates, beyond directional lean. Learn more
Epistemic Quality
How well-sourced and evidence-based is this content?
0.73 medium claims
Sources
0.8
Evidence
0.7
Uncertainty
0.7
Purpose
0.8
Propaganda Flags
1 manipulative rhetoric technique found
1 techniques detected
loaded language
Use of terms like 'malicious cyber-attack,' 'hacked,' 'stolen,' 'exposed' — though these are factually accurate technical descriptions of the security breach rather than distortions
Emotional Tone
Emotional character: positive/negative, intensity, authority
urgent
Valence
-0.6
Arousal
0.8
Dominance
0.5
Transparency
Does the content identify its author and disclose interests?
0.50
✓ Author
More signals: context, framing & audience
Solution Orientation
Does this content offer solutions or only describe problems?
0.55 mixed
Reader Agency
0.5
Stakeholder Voice
Whose perspectives are represented in this content?
0.65 5 perspectives
Speaks: governmentinstitutionindividuals
About: individualsmarginalized
Temporal Framing
Is this content looking backward, at the present, or forward?
present short term
Geographic Scope
What geographic area does this content cover?
national
United States
Complexity
How accessible is this content to a general audience?
moderate low jargon general
Audit Trail 7 entries
2026-02-28 12:25 eval_success Lite evaluated: Moderate positive (0.50) - -
2026-02-28 12:25 eval Evaluated by llama-3.3-70b-wai: +0.50 (Moderate positive)
2026-02-28 12:25 rater_validation_warn Lite validation warnings for model llama-3.3-70b-wai: 0W 1R - -
2026-02-28 12:21 eval_success Lite evaluated: Moderate positive (0.56) - -
2026-02-28 12:21 eval Evaluated by llama-4-scout-wai: +0.56 (Moderate positive)
2026-02-28 12:20 rater_validation_warn Lite validation warnings for model llama-4-scout-wai: 1W 1R - -
2026-02-28 12:19 eval Evaluated by claude-haiku-4-5-20251001: +0.36 (Moderate positive)