{"id":4490,"date":"2017-04-12T22:41:20","date_gmt":"2017-04-12T14:41:20","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4490"},"modified":"2017-04-13T23:36:14","modified_gmt":"2017-04-13T15:36:14","slug":"prisoners-hack-prison-from-inside-prison","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2017\/04\/prisoners-hack-prison-from-inside-prison\/","title":{"rendered":"Prisoners Hack Prison From Inside Prison"},"content":{"rendered":"

Prisoners Hack Prison! Sounds exciting right? This time it’s actually pretty entertaining with the prisoners managing to hack a prison network from INSIDE the prison using scavenged PC parts from a rehabilitation class.<\/p>\n

\"Prisoners<\/p>\n

Some pretty resourceful guys managing to build 2 functional PCs from scrapped parts AND connect to the prison network AND try and hack their way out of the proxy.<\/p>\n

We are impressed by prisoners in the US who built two personal computers from parts, hid them behind a plywood board in the ceiling of a closet, and then connected those computers to the Ohio Department of Rehabilitation and Correction’s (ODRC) network to engage in cyber shenanigans.<\/p>\n

Compliment are less forthcoming from the State of Ohio’s Office of the Inspector General, which published its 50-page report [PDF] into this incident yesterday, following a lengthy investigation.<\/p>\n

The Inspector General was alerted to the issue after ODRC’s IT team migrated the Marion Correctional Institution from Microsoft proxy servers to Websense. Shortly afterwards, on 3 July 2015, a Websense email alert reported to ODRC’s Operation Support Centre (OSC) that a computer operating on the network had exceeded a daily internet usage threshold. Further alerts, seven regarding “hacking” and 59 regarding “proxy avoidance”, reported that the user was committed to network mischief.<\/p>\n

From there the search for the miscreant began, and once the log-in credentials used were found to be illicit, the ODRC’s IT employees attempted to find the unauthorised computer by locating the network switch it was connected into.<\/p><\/blockquote>\n