American prisoners assemble computers, connect to prison networks to text their mothers
The authorities have discovered a prisoner at Marion Correctional Institution, Ohio, USA, who assembled two computers and hid it on the ceiling.
The hard drive of computers connected to this prison network contains a lot of pornography, Windows proxy servers, VPN software, VOIP, Tor browser and password hacking tools and sending tools. Spam email and open source package of Wireshark analyzer. Even these criminals install antivirus software for their computers.
Prisoners illegally access here to connect the networks for the computers they make themselves.
According to the investigation, these daring prisoners picked up components to assemble computers when participating in computer skills training and electronics recycling programs held at the prison. First, the IT department of the prison discovers an unauthorized computer access to the network with internet traffic exceeding the specified threshold. This computer has been operating for about 4 months before being detected.
It is known that a prisoner still called and texted his mother through this computer.
After a three-week search, authorities found the computer hidden in the gymnasium's locker room unlimited for unregulated prisoners.
After analyzing forensic information about the hard drive obtained, authorities discovered that it was filled with malicious code that the prisoners had downloaded. In addition, prisoners have used computers to register credit cards, seek tax frauds, find information about prisoners and access restricted areas. Moreover, they also find instructions on how to make addictive substances, plastics, explosives .
The ceiling where the prisoners hid two computers.
Five prisoners involved in the incident were transferred to another facility.
According to the investigation, the prisoners brought two computers that they were ordered to dismantle to recycle inside the prison, attaching necessary components such as hard drives and network cards, installing in hiding places, overcoming the Security checkpoints without being detected. In addition, they run network lines and power lines to connect computers to the prison's electrical and network systems.
Randall Meyer, Ohio State Inspector General, said it was the prison's loose supervision that enabled prisoners to carry out the above behavior. The authorities said they would scrutinize the reports and make necessary adjustments to avoid future incidents.
- Prisoners who have never escaped, prisoners who are released also do not want to go to prison
- Discover the world's most liberal prison
- Archaeological site of torture of prisoners
- Practice yoga in prison
- Romanian Hacker stirred up NASA and US Navy networks
- Convert user status information to Windows XP
- 'The germ cell case': Mr. Hwang Woo Suk received 2 years in prison
- Be careful with modern technology
- Detecting rare weapons of Phan Dinh Phung insurgents
- Children exposed too much to social networks are more likely to lead to feelings of loneliness and inferiority
- Facebook weakens physical children
- Computers learn to look like people