AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages!

You are not logged in. Login here for full access privileges.

Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page
   Networked Database  Computer Support/Help/Discussion...   [29 / 1585] RSS
 From   To   Subject   Date/Time 
Message   Sean Dennis    All   Where there's a will...   April 13, 2017
 8:32 PM *  

Hello All,

From:
http://dailycaller.com/2017/04/13/report-inma...
 atch-porn-hack-prison-network/

=== Cut ===
Report: Inmates Built Their Own Computers To Watch Porn, Hack Prison Network

ERIC LIEBERMAN
Tech and Law Reporter
2:40 PM 04/13/2017

Inmates at a medium-security prison in Ohio surreptitiously built a complex 
computer network in 2015 to spy on the facility's own system and to watch 
pornography, according to an inspector general report released Tuesday.

An analysis of the hard drives found on the computers reveal that prisoners 
also used the technology to search records of fellow inmates, acquire official 
passes to access certain restricted areas in the prison, research tax fraud, 
and apply for credit cards. The computers were able to be installed without 
detection because some inmates participating in special community-related 
programs at the Marion Correctional Institution were not constantly monitored.

The official report from Randall J. Meyer, the inspector general of Ohio, 
reads: "For example, Spriggs and Johnston took two computers that should have 
been disassembled, placed hard drives into the computers, installed a network 
card, transported the computers across the institution for approximately 1,100 
feet, through the security check point without being searched or challenged by 
staff, accessed an elevator to the third floor, and placed the two computers 
in the ceiling of the P3 training room. Additionally, Spriggs and Johnston not 
only placed the two computers in the ceiling, they also ran wire, cable, and 
power cords to connect the devices undetected onto the ODRC [Ohio Department 
of Rehabilitation and Correction] network."

Johnston even told investigators that he would regularly go back to the room 
to make any necessary modifications to the concealed computers.

The tech-savvy criminals took the computer parts from an internal computer 
skills and electronics recycling program. They were even able to download 
anti-virus software, e-mail spamming tools, and several other advanced 
functions for the computer to help hide the computer's identity, and engage in 
criminal acts.

Prison staff discovered the two computers hidden in the plywood boards of the 
ceiling in August of 2015 after they noticed that internet usage surpassed an 
allowed threshold. It took the employees and investigators three weeks to find 
the computers. They estimate that the inmates operated the computers and all 
of its capabilities for roughly four months.

"Investigators determined prisoners took advantage of the freedoms, programs, 
and lax security standards at MCI," the report reads.

The same investigators also found that inmates were allowed unsupervised 
access to computers and large areas of the institution.

The ODRC vows to thoroughly review security protocol at the facility and 
ensure that it doesn't happen again.
=== Cut ===

Later,
Sean

--- GoldED+/LNX 1.1.5-b20160322
 * Origin: Outpost BBS * Limestone, TN, USA (618:618/1)
  Show ANSI Codes | Hide BBCodes | Show Color Codes | Hide Encoding | Hide HTML Tags | Show Routing
Previous Message | Next Message | Back to Computer Support/Help/Discussion...  <--  <--- Return to Home Page

VADV-PHP
Execution Time: 0.0127 seconds

If you experience any problems with this website or need help, contact the webmaster.
VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved.
Virtual Advanced Copyright © 1995-1997 Roland De Graaf.
v2.1.220106