Adam Johnston and Scott Spriggs were incarcerated at Marion Correctional Institution (MCI), a low-security facility which utilized inmate labor to recycle old computers. Spriggs and Johnson handled and snatched dozens of parts to build two new machines to operate from within MCI. The computers were revealed to contain several applications for credit cards, pornography, and research on tax refund fraud. The inmates were also capable of issuing new passes for inmates to attain restricted access to numerous areas throughout the prison.
Incidentally, the pair ran connection cables through the ceiling and down to the network switch, where it was linked to port sixteen, and acquired internet access. Once they were connected, they viewed articles on home-made drugs, submitting fraudulent tax returns, and credit cards. In addition, they stole the identity of another inmate and applied his name and social security number for five different credit card applications. Investigators discovered an inventory of hacking tools, as well as brute force password crackers, an email spamming program, and a Java-based tool employed to perpetrate man-in-the-middle attacks. The abundance of prohibited programs allowed the pair to grant passes to prisoners and to retrieve inmate records such as disciplinary records, sentencing data, and prisoner locations.
…show more content…
The internal controls of the prison and most specifically their recycling program must be revised and revamped. The worst possible scenario imaginable is if the inmates attained access to all the cell doors to execute hits throughout the prison network or slowly siphoned inmates out of prison for a hefty price. The future of cybercrime from within the prison system appears unlimited as guards aren’t even capable of keeping drugs out of