19 October 2017
Find out more

Prisoners build PCs from stolen parts then apply for credit cards in fellow inmate's name

13 April 2017  |  8562 views  |  0 Security

A pair of enterprising American prisoners managed to steal enough spare parts from a work programme to put together two computers, which they hid in a closet ceiling and used for various escapades, including to apply for credit cards in another inmate's name.

According to a report (PDF) from the Ohio Inspector General, Marion Correctional Institution prisoners Adam Johnston and Scott Spriggs used their homemade PCs to apply for the credit cards with a stolen identity, investigate tax fraud, make passes to get access to unauthorised areas of the prison, download porn, and view information on manufacturing drugs and explosives.

The pair obtained their parts through a prison green initiative, which saw inmates disassemble old electronic equipment for recycling. After getting together enough parts to build their PCs, they hid them on a plywood board in a closet.

Then they used ethernet cables to hook up the computers to the prison network, logging in with credentials nabbed from a former prison staffer who then worked as a contractor.

Once on the network, the duo looked through prison records, using one crook's Social Security number and date of birth to apply for credit cards, some of which were approved and mailed to one of the pair's mother.

The computers were also used to download TV shows, music and porn, which was then passed around to other prisoners on a thumb drive.

A forensic analysis of the hard drives also found "a large hacker's toolkit" and "findings of bitcoin wallets, stripe accounts, bank accounts, and credit card accounts [which] point toward possible identity fraud, along with other possible cyber-crimes".

The scam was uncovered when an automated email informed the prison that a computer tied to the stolen login credentials had exceeded its daily internet usage threshold. This was followed by alerts about an unauthorised computer trying to hack through proxy servers. The PCs were then found via the network switch they were connected to.

Johnston, Spriggs and three others found to be involved in the scam have been separated and moved to different facilities.

Comments: (0)

Comment on this story (membership required)

Finextra news in your inbox

For Finextra's free daily newsletter, breaking news flashes and weekly jobs board: sign up now

Related blogs

Create a blog about this story (membership required)
visit www.vasco.comvisit www.fivedegrees.nlvisit www.capgemini.com

Top topics

Most viewed Most shared
Ripple looks to drive bank adoption with $300m XRP rebate programmeRipple looks to drive bank adoption with $...
15686 views comments | 12 tweets | 4 linkedin
Swift positive on blockchain, but big challenges remainSwift positive on blockchain, but big chal...
8857 views comments | 16 tweets | 22 linkedin
satelliteGates Foundation backs Ripple collaboratio...
7959 views comments | 13 tweets | 10 linkedin
IBM uses blockchain to improve cross-border payments processingIBM uses blockchain to improve cross-borde...
7079 views comments | 9 tweets | 17 linkedin
Santander InnoVentures leads $6m funding round for Mexico's ePesosSantander InnoVentures leads $6m funding r...
6210 views comments | 6 tweets | 3 linkedin

Featured job

circa £250K total package
London

Find your next job