Drone Deliveries into Prisons
Seems it’s now common to sneak contraband into prisons with a drone.
Continue reading Drone Deliveries into Prisons
Collaborate Disseminate
Seems it’s now common to sneak contraband into prisons with a drone.
Continue reading Drone Deliveries into Prisons
There was a massive prison break in Abuja, Nigeria:
Armed with bombs, Rocket Propelled Grenade (RPGs) and General Purpose Machine Guns (GPMG), the attackers, who arrived at about 10:05 p.m. local time, gained access through the back of the prison, using dynamites to destroy the heavily fortified facility, freeing 600 out of the prison’s 994 inmates, according to the country’s defense minister, Bashir Magashi….
What’s interesting to me is how the defenders got the threat model wrong. That attack isn’t normally associated with a prison break; it sounds more like a military action in a civil war…
In this entertaining story of French serial criminal Rédoine Faïd and his jailbreaking ways, there’s this bit about cell phone surveillance:
After Faïd’s helicopter breakout, 3,000 police officers took part in the manhunt. According to the … Continue reading Identifying People Through Lack of Cell Phone Use
A pair of computer scientists from Purdue University are leading a controversial new four-year study using AI-enabled surveillance to track recently released prison parolees. The project’s goal is to lower rates of recidivism by identifying early inter… Continue reading AI surveillance study tracks criminals post release to cut recidivism
My Applied Cryptography is on a list of books banned in Oregon prisons. It’s not me — and it’s not cryptography — it’s that the prisons ban books that teach people to code. The subtitle is "Algorithms, Protocols, and Source Code in C" — and that’s the reason. My more recent Cryptography Engineering is a much better book for prisoners,… Continue reading Applied Cryptography is Banned in Oregon Prisons
They allegedly victimized 442 military men by sending nude photos and then calling, pretending to be irate fathers or police. Continue reading Prisoners allegedly posed as underage girls in $560K sextortion scam
Prisons want jamming technology to stop criminal activity, but critics warn there would be dire consequences if jamming was allowed to propagate. Continue reading ‘This Is a War’: Prisons Want Cell Phone Jammers to Stop Inmates from Communicating With the Outside World
364 of them hacked the JPay tablets they use for email, music and games and transferred money into their own accounts. Continue reading Prisoners exploit tablet vulnerability to steal nearly $225K
This is kind of amazing: Inmates at a medium-security Ohio prison secretly assembled two functioning computers, hid them in the ceiling, and connected them to the Marion Correctional Institution’s network. The hard drives were loaded with pornography, a Windows proxy server, VPN, VOIP and anti-virus software, the Tor browser, password hacking and e-mail spamming tools, and the open source packet… Continue reading Inmates Secretly Build and Network Computers while in Prison
A Scottish prison used the device to catch inmates using mobile phones. Continue reading Here Is the Contract for the UK’s First Confirmed IMSI Catcher