Feeds

South African wireless traffic lights pillaged by SIM-card thieves

Don't stop at the lights unless you want free phone calls

Internet Security Threat Report 2014

The Johannesburg Road Agency is in talks with suppliers to try and stop thieves targeting its shiny new traffic lights for the SIM cards they contain.

The Agency has been forking out thousands of rand on phone calls the thieves subsequently make using the snaffled SIMs.

Thulani Makhubela, spokesman for the JRA, said: “The JRA has been severely affected with this crime and this now means we have to fork out more money on something that we should not have spent a cent on.”

Makubela said the agency was now cancelling the SIMs stolen from the GPRS units inside some of the traffic lights and working with Johannesburg police to stop the traffic light thefts. Ordinary lights have not been targeted by the gangs – although there were some thefts of traffic light poles last year for their scrap value.

The spokesman said the JRA was also in talks with suppliers to make the lights' components more secure.

He told the Guardian the attacks were "systematic and co-ordinated" and thieves knew which lights to attack and "clearly have information".

Four hundred out of 600 SIM-equipped traffic lights have been hit in the last three months and it will cost R8.8m (£838,000) to replace missing components and repair them. ®

Remote control for virtualized desktops

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Simplify SSL certificate management across the enterprise
Simple steps to take control of SSL across the enterprise, and recommendations for a management platform for full visibility and single-point of control for these Certificates.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.