Skip to main content

Prison inmates built secret PCs and successfully connected to the internet

The Ohio Inspector General’s Office has published a report detailing a very unusual PC build. Two inmates at the Marion Correctional Institution in Marion, Ohio apparently managed to build two computers and connect them to the prison’s network.

Suspicions were raised in July 2015, when the facility’s IT staff received an email about a contractor’s PC exceeding its daily internet access quota. This wouldn’t have been out of the ordinary, but the contractor in question only worked Monday through Thursday, and the alert came in on a Friday, according to a report from Tripwire.

Another alert came in two weeks later, at which point it seemed that the user was attempting to access proxy avoidance websites. Upon further investigation, it emerged that the computer wasn’t one of the known computers available for use in the prison’s PC training area.

At this point, a member of the facility’s IT support staff found a mysterious cable, and followed it to see what it was hooked up to. It led to the ceiling, and upon removing a couple of tiles, the staff member discovered a hidden pair of PCs resting on pieces of plywood.

The inmates were apparently using these computers for more than just browsing Facebook and watching videos on YouTube. As well as viewing pornography and downloading software, the PCs were apparently used to access guides on making drugs and explosives, steal the identity of a fellow inmate, and even commit tax fraud.

A total of five inmates have been found to be involved with the exploit, and as a result they have been moved to other institutions. Ohio Inspector General Randall J. Meyer compared the outlandish scenario to an episode of prisoner-of-war sitcom Hogan’s Heroes in an interview with a local ABC affiliate.

Editors' Recommendations

Brad Jones
Brad is an English-born writer currently splitting his time between Edinburgh and Pennsylvania. You can find him on Twitter…
Bosch is connecting batteries to the internet to help EVs go the extra mile
2019 Jaguar I-Pace First Drive

Bosch is putting cloud-based swarm intelligence in charge of monitoring how quickly electric car batteries age. This cutting-edge technology has the potential to keep electric cars on the road for longer by reducing battery cell wear, which will ultimately save motorists money. It's currently being tested as part of a pilot program.

Think about your last best laptop or best smartphone; you likely noticed the battery lost its ability to hold a charge as it aged. Electric cars inevitably suffer from the same problem, and it's precisely what Bosch hopes to address with its battery-in-the-cloud technology. The software continuously monitors the individual cells that make up a lithium-ion battery pack, gathers data on them, and sends the information to the cloud. The technology hoists a red flag when it detects a cell is aging too quickly.

Read more
Can your internet connection handle game streaming on Google Stadia?
google stadia vs nvidia geforce now controller  3

Gamers looking to stream games using Google's Stadia service will want to have a mobile broadband connection that supports at the bare minimum 10 Mbps download speeds, though you'll want an even faster connection for a better experience. Google announced the broadband speed requirements at its Stadia launch event today, noting that the 10 Mbps speeds will allow gamers to play 720p games with 60 frames-per-second rates and stereo audio.

For comparison, streaming just YouTube videos in 720p requires a 2.5 Mbps internet connection, so gamers are looking at four times this speeds to handle games on Stadia at the same resolution.

Read more
Internet Explorer zero-day exploit makes files vulnerable to hacks on Windows PCs
Windows 10 Surface Pro 4 stock photo

There were already a number of reasons to not use Internet Explorer. But if you needed another one, here it is.

According to ZDNet, a security researcher named John Page has published evidence of an Internet Explorer zero-day exploit that renders Windows PCs vulnerable to having their files stolen by hackers.

Read more