I think you’re really overstating the difficulty. Especially in the context of a denial-of-service attack on a camera system, which really is easy mode: there’s no need for persistence, the storage is being continuously rewritten so there’s not much free space to worry about, and an approximately-identical copy of the whole security system can probably be bought from the same camera vendor to use as a testbed.
The best analogy I can make: Start with editing and submitting a spliced Zelda speedrun to speedrun.net before you say it’s easy to keep the FBI from uncovering pretty clear evidence of a your DOS attack against CCTV inside a monitored internal network.
The best analogy I can make: Start with editing and submitting a spliced Zelda speedrun to speedrun.net before you say it’s easy to keep the FBI from uncovering pretty clear evidence of a your DOS attack against CCTV inside a monitored internal network.