Inmates built computers hidden in ceiling, connected them to prison network

Ohio Office of the Inspector General

Inmates at a medium-security Ohio prison secretly assembled two functioning computers, hid them in the ceiling, and connected them to the Marion Correctional Institution’s network. The hard drives were loaded with pornography, a Windows proxy server, VPN, VOIP and anti-virus software, the Tor browser, password hacking and e-mail spamming tools, and the open source packet analyzer Wireshark.

That’s according to a new report (PDF) from the Ohio Office of the Inspector General, which concluded that the geeky inmates obtained the parts from an onsite computer skills and electronics recycling program. The agency’s IT department, according to the report, initially was alerted to a connected device, using a contractor’s stolen credentials, that had “exceeded a daily Internet usage threshold.” The computers were operational for about four months. After a three-week search, they were discovered above a training room closet in an area off limits to unsupervised inmates. Ultimately, the authorities traced cable from a networking switch to find the devices that were assembled with discarded computers from an Ohio aircraft parts company and an Ohio school district.

Read 8 remaining paragraphs | Comments

Ars Technica

Post Author: martin

Martin is an enthusiastic programmer, a webdeveloper and a young entrepreneur. He is intereted into computers for a long time. In the age of 10 he has programmed his first website and since then he has been working on web technologies until now. He is the Founder and Editor-in-Chief of BriefNews.eu and PCHealthBoost.info Online Magazines. His colleagues appreciate him as a passionate workhorse, a fan of new technologies, an eternal optimist and a dreamer, but especially the soul of the team for whom he can do anything in the world.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.