It turns out that thousands of speed camera reports have been invalidated because a technician was updating machines with a tainted memory stick:
A contractor in the Australian State of Victoria has managed to infect an unknown number of speed cameras with a virus, over sneakernet.
Details aren’t so much sketchy as they are confused: the virus has been identified as WannaCrypt, but the government’s been told it infected both Linux and Windows-based cameras; there was no ransom demand; the main symptom was repeated camera reboots, and; contractors apparently hoped to keep things quiet by patching cameras without telling anyone.
The lid came off on Friday, and Victoria Police decided to cancel 590 fines issued by 55 cameras infected by a contractor visiting the cameras to perform software upgrades with a USB drive that also carried something nasty.
The number of known infections rose to 97 out of the state’s total of 280 speed cameras, after one of the state’s speed camera contractors, Redflex, told the Department of Justice it had identified and patched a further 42 infections earlier in June.
………
In excess of 7,500 fines issued between June 6 and June 22 are to be “quarantined” during the investigation, but may be reissued once the investigation is completed.
I want to state that I have no direct knowledge of any hacking operations, but if, for example, the good folks at 4Chan decided to hack speed cams and red light cams, I would donate to a GoFundMe of their legal defense.
In the United States, at least, these programs are more about revenue generation and getting money to private contractors who operate the systems.