Here's hoping they didn't smuggle a full size ATX motherboard through the facility using the 'old fashioned' prison method. Or even a 3.5" SATA hard drive...
Did anybody notice the photo of the wiring rack? No wonder the inmates could get away w/ running cables: <a href="http://static-26.sinclairstoryline.com/resources/media/a6609eb6-d7ab-41dc-a578-79c611ae7aee-computersfoundinceiling2.JPG" rel="nofollow">http://static-26.sinclairstoryline.com/resources/media/a6609...</a>
> The inmates were able to get the parts from a program where inmates break down computers in order to learn computer skills and recycle the parts.<p>It appears the program provided an effective education.
Hah, reminds me of the plot of "The Blue Nowhere", wherein the protagonist builds a computer (and a modem) from discrete components whilst in prison
That's crazy, how was security so lax that a physical connection was enough to access state systems? Surely you'd require some kind of staff login.
TLDR: Inmates, thirsty for knowledge, construct an internet-connected computer in the ceiling! Cool!<p>Aaaand... immediately use it for tax fraud. <i>facepalm</i>
So they were able to connect to the prison network, look through the state prison database using these computers and issue security passes to gain access to restricted areas.<p>I think the prison needs to get someone to look at the security of their network and applications.
Actually prisons can do more of this, ofcource in an ethical and secured environment with thorough check up of Prisioners. They could become low cost assembly houses, instead of shipping in from China.
Kind of shitty that they immediately used the computers to fuck people over...<p><pre><code> The Ohio Inspector General says investigators found
an inmate used the computers to steal the identity
of another inmate, and then submit credit card
applications, and commit tax fraud.
One inmate, Adam Johnston, reportedly admitted to
applying for the credit cards, saying he just looked
through the ODRC system for a young inmate with a long
sentence, then used his information to get the cards.
</code></pre>
You'd hope that, provided access to something rare, the use would be benign and reasonable.