AT2k Design BBS Message Area
Casually read the BBS message area using an easy to use interface. Messages are categorized exactly like they are on the BBS. You may post new messages or reply to existing messages! You are not logged in. Login here for full access privileges. |
Previous Message | Next Message | Back to Computer Support/Help/Discussion... <-- <--- | Return to Home Page |
|
||||||
From | To | Subject | Date/Time | |||
Sean Dennis | All | Where there's a will... |
April 13, 2017 8:32 PM * |
|||
Hello All, From: http://dailycaller.com/2017/04/13/report-inma... atch-porn-hack-prison-network/ === Cut === Report: Inmates Built Their Own Computers To Watch Porn, Hack Prison Network ERIC LIEBERMAN Tech and Law Reporter 2:40 PM 04/13/2017 Inmates at a medium-security prison in Ohio surreptitiously built a complex computer network in 2015 to spy on the facility's own system and to watch pornography, according to an inspector general report released Tuesday. An analysis of the hard drives found on the computers reveal that prisoners also used the technology to search records of fellow inmates, acquire official passes to access certain restricted areas in the prison, research tax fraud, and apply for credit cards. The computers were able to be installed without detection because some inmates participating in special community-related programs at the Marion Correctional Institution were not constantly monitored. The official report from Randall J. Meyer, the inspector general of Ohio, reads: "For example, Spriggs and Johnston took two computers that should have been disassembled, placed hard drives into the computers, installed a network card, transported the computers across the institution for approximately 1,100 feet, through the security check point without being searched or challenged by staff, accessed an elevator to the third floor, and placed the two computers in the ceiling of the P3 training room. Additionally, Spriggs and Johnston not only placed the two computers in the ceiling, they also ran wire, cable, and power cords to connect the devices undetected onto the ODRC [Ohio Department of Rehabilitation and Correction] network." Johnston even told investigators that he would regularly go back to the room to make any necessary modifications to the concealed computers. The tech-savvy criminals took the computer parts from an internal computer skills and electronics recycling program. They were even able to download anti-virus software, e-mail spamming tools, and several other advanced functions for the computer to help hide the computer's identity, and engage in criminal acts. Prison staff discovered the two computers hidden in the plywood boards of the ceiling in August of 2015 after they noticed that internet usage surpassed an allowed threshold. It took the employees and investigators three weeks to find the computers. They estimate that the inmates operated the computers and all of its capabilities for roughly four months. "Investigators determined prisoners took advantage of the freedoms, programs, and lax security standards at MCI," the report reads. The same investigators also found that inmates were allowed unsupervised access to computers and large areas of the institution. The ODRC vows to thoroughly review security protocol at the facility and ensure that it doesn't happen again. === Cut === Later, Sean --- GoldED+/LNX 1.1.5-b20160322 * Origin: Outpost BBS * Limestone, TN, USA (618:618/1) |
||||||
|
Previous Message | Next Message | Back to Computer Support/Help/Discussion... <-- <--- | Return to Home Page |
Execution Time: 0.0175 seconds If you experience any problems with this website or need help, contact the webmaster. VADV-PHP Copyright © 2002-2024 Steve Winn, Aspect Technologies. All Rights Reserved. Virtual Advanced Copyright © 1995-1997 Roland De Graaf. |