|
|
|
|
Investigation Finds Inmates Built Computers, Hid Them In Prison Ceiling
The discovery of two working computers hidden in a ceiling at the Marion Correctional Institution prompted an investigation by the state into how inmates got access. In late July, 2015 staff at the prison discovered the computers hidden on a plywood board in the ceiling above a training room closet. The computers were also connected to the Ohio Department of Rehabilitation and Correction's network. Authorities say they were first tipped off to a possible problem in July, when their computer network support team got an alert that a computer "exceeded a daily internet usage threshold." When they checked the login being used, they discovered an employee's credentials were being used on days he wasn't scheduled to work. That's when they tracked down where the connection was coming from and alerted Marion Correctional Institution of a possible problem. Investigators say there was lax supervision at the prison, which gave inmates the ability to build computers from parts, get them through security checks, and hide them in the ceiling. The inmates were also able to run cabling, connecting the computers to the prison's network. Furthermore, "investigators found an inmate used the computers to steal the identify of another inmate, and then submit credit card applications, and commit tax fraud," reports WRGB. "They also found inmates used the computers to create security clearance passes that gave them access to restricted areas." |
|
|
|
There are no conversations. |
|
|
cauz |
April 12, 2017, 1:06 p.m. |
|
|
|
Anthony Hamilton |
It was very important for me to touch on things that haven't changed, like schools. I'm in Cleveland, Ohio. My lady's from Ohio, and the schools are being torn down, and they turned them into high-rise condos. |
Robert Cailliau |
The Web is actually a coming together of three technologies, if you like: the hypertext, the personal computer, and the network. So, the network we had, and the personal computers were there, but people didn't use them, because they didn't know what to use them for, except maybe for a few games. |
Warren Farrell |
We always look at the 'Fortune 500,' and we say, men in power, but we don't look at the glass cellar as opposed to the glass ceiling and say, men also are the homeless, men are also the ones that are the garbage collectors. Men are also the ones dying in construction sites that aren't properly supervised for safety hazards. |
Daryl Gates |
It was a department where you had honesty and integrity stamped right on you when you came into the Los Angeles Police Department. If you violated that, or if you were a dishonest cop, you were terrible. We got rid of you as quickly as possible. |
Frederik, Crown Prince of Denmark |
Historically, royal families have represented an institution. The institution is built on heritage, and is timeless in that sense. |
Romola Garai |
When you talk to women who were working as print journalists or in broadcasting in the '50s, and then you talk to women who were working in the late '60s, there's an enormous difference. There had already been a huge transition. Then, of course, you get well into the '70s and there were women with children working. |
David Icke |
The BBC sports department when I was there was seriously to the right of Ghengis Khan, and if people think I am strange, they should have met some of the production staff I worked with. Margaret Thatcher and the Queen were the pin up girls for many of them. |
Jan Egeland |
Finally, I also come in recognition of the great work that has been undertaken by the NGOs and UN agencies that have been active for many years here, especially through the local staff and international staff here in Somaliland and in Somalia at large. |
Nicolas Cage |
Snakes are sometimes perceived as evil, but they are also perceived as medicine. If you look at an ambulance, there's the two snakes on the side of the ambulance. The caduceus, or the staff of Hermes, there's the two snakes going up it, which means that the venom can also be healing. |
Uzo Aduba |
When it comes to inmates, we have boiled them down to just the few things we know about them - their crime, their current life situation, their identification number. But the reality is they were something before they were their crime. |
|
|
We are impressed by five prisoners in the US who built two personal computers from parts, hid them behind a plywood board in the ceiling of a closet, and then connected those computers to the Ohio Department of Rehabilitation and Correction's (ODRC) network to engage in cybershenanigans.
Compliments are less forthcoming from the State of Ohio's Office of the Inspector General, which published its 50-page report [PDF] into this incident yesterday, following a lengthy investigation.
The Inspector General was alerted to the issue after ODRC's IT team migrated the Marion Correctional Institutio...
This post is a comment.
|
|
|
|
US Says North Korea 'Directly Responsible' For WannaCry Ransomware Attack
The White House has publicly blamed North Korea for a ransomware attack in May that locked more than 300,000 computers in 150 countries. From a report: In an opinion piece published in The Wall Street Journal on Monday, Homeland security adviser Tom Bossert writes that after careful investigation, Washington can say that Pyongyang is "directly responsible" for the WannaCry virus. Bossert called the attack in which victims received ransom demands to unlock their computers "cowardly, costly and careless." "The consequences and repercussions of WannaCry were beyond economic," he wrote. "The malicious software hit compu...
|
|
|
|
this is an old quote i found about sean parker from my fb memories
"He’s always talking about the potential of computers to generate algorithms for likable melodies, and we have this ongoing argument: he believes it’s only a matter of time before computers will be able to create listenable tunes."
|
|
|
|
Malware Developer Who Used Spam Botnet To Pay For College Gets No Prison Time (bleepingcomputer.com)
An anonymous reader writes: The operator of a 77,000-strong spam botnet was sentenced to two years probation and no prison time after admitting his crime and completely reforming his life. The former botnet operator is now working for a cybersecurity company, and admitted his actions as soon as the FBI knocked on his door back in 2013. The botnet operator, a 29-year-old from Santa Clara, California, says he was tricked by fellow co-schemers who told him they were not doing anything wrong by infecting computers with malware because they were not accessing private information such as banking...
|
|
|
|
How The FBI Used Geek Squad To Increase Secret Public Surveillance
In 2011 a gynecology doctor took his computer for repairs at Best Buy's Geek Squad. But the repair technician was a paid FBI informant -- one of several working at Geek Squad -- and the doctor was ultimately charged with possessing child pornography, according to OC Weekly. An anonymous reader quotes their new report: Recently unsealed records reveal a much more extensive secret relationship than previously known between the FBI and Best Buy's Geek Squad, including evidence the agency trained company technicians on law-enforcement operational tactics, shared lists of targeted citizens and, to covertly increase surveillance ...
|
|
|
|
The CCleaner Malware Fiasco Targeted at Least 20 Specific Tech Firms
Hundreds of thousands of computers getting penetrated by a corrupted version of an ultra-common piece of security software was never going to end well. But now it's becoming clear exactly how bad the results of the recent CCleaner malware outbreak may be. Researchers now believe that the hackers behind it were bent not only on mass infections, but on targeted espionage that tried to gain access to the networks of at least 20 tech firms. Earlier this week, security firms Morphisec and Cisco revealed that CCleaner, a piece of security software distributed by Czech company Avast, had been hijacked by hackers and loaded with a backdoor that evaded the company's security checks. It wound up installed on more than 700,000 co...
|
|
|
|
How the NSA Plans to Infect ?Millions? of Computers with Malware|https://firstlook.org/theintercept/article/2014/03/12/nsa-plans-infect-millions-computers-malware/?t=dXNlcmlkPTUyMDcxMjMyLGVtYWlsaWQ9NTc3MQ==
|
|
|
|
Five years later and I'm still installing the same shit - just on different computers.
|
|
|
|
Police Departments Are Training Dogs To Sniff Out Thumb Drives
A CNET report provides some insight on an elite K-9 search class that trains dogs to sniff out electronics, including phones, hard drives and microSD cards smaller than your thumb. From the report: Only one out of every 50 dogs tested qualifies to become an electronic storage detection, or ESD, dog, says Kerry Halligan, a K-9 instructor with the Connecticut State Police. That's because it's a lot harder to detect the telltale chemical in electronics than it is to sniff out narcotics, bombs, fire accelerants or people, she says. But Labrador retrievers like Harley, with their long snouts and big muzzles, can pick up even the fa...
|
|
|
|
I don't know how or why any part of society would enforce that system of upgrading the robots.
Elon is going to put computers in our brains and then we'll upgrade those instead.
This post is a comment.
|
|