Inmates at Marion Correctional Institution in Ohio turned a recycling program into a secret cybercrime setup. They stole computer parts, built two working PCs, hid them in a ceiling and used the prison’s own network to steal identities and run fraud.
- Inmates at Marion Correctional Institution construct secret computers from recycled components and hide them in a ceiling to facilitate identity theft.
- Ohio Inspector General Randall Meyer reports five inmates bypassed checkpoints with hardware to tap into the prison network until July 2015.
- The operation reveals systemic security failures as inmates utilize stolen employee passwords to file fraudulent tax returns from behind prison walls.
The whole thing went on for months inside a prison that holds about 2,500 inmates. The men were supposed to be breaking down old electronics for recycling. Instead, they kept the good pieces and carried them more than 1,100 feet through the facility, past guards, metal detectors, and checkpoints.
They put the finished computers on a plywood frame in the ceiling of a training room closet and ran cables down through the walls to tap into the prison network. Once connected, they started downloading hacking tools, stealing employee passwords by watching people type, and using stolen identities to apply for credit cards and file fake tax returns.
The Inmates Involved
Five inmates ended up tied to the operation: Stanislov Transkiy, who chaired the recycling committee, Leeshan McCullough, chairman of aquaculture, Robert Cooper, chairman of horticulture, Matthew Brown, chairman of environmental education and Adam Johnston, the executive treasurer.
All five were later moved to different prisons.
Genuine News Deserves Honest Attention.
High-conviction projects require an intelligent audience. Connect with readers who value sharp reporting.
👉 Submit Your PRHow It Got Found
On July 3, 2015, the prison’s monitoring system picked up a strange spike in internet usage on a contractor’s account, on a day the contractor wasn’t even scheduled to be there. IT staff followed the cables and pulled down some ceiling tiles. That’s when they saw the two computers sitting on plywood, fully hooked up and running.
Ohio Inspector General Randall Meyer looked into it and called the whole thing a serious breakdown in basic security. The recycling program had almost no real oversight. Parts weren’t properly tracked. Searches were too loose. And once someone got an employee password, they could move around the system far too easily.
The Ohio Department of Rehabilitation and Correction said they would review everything and tighten up how they handle technology in rehab programs. They noted the need to keep safeguards in place while still giving inmates meaningful work.
Chain Street’s Take
This one sticks with you because it was so simple. No fancy smuggled phones or drones, just scrap parts, some plywood, and a lack of real supervision. The inmates had skills, time, and a program that gave them access to exactly what they needed.
In the end, it wasn’t sharp-eyed guards who caught them. It was a basic bandwidth alert that noticed too much data moving at the wrong time. That says a lot about where the real weaknesses were.
Prisons keep adding more technology for administration and rehab programs. This case shows why that brings new risks. If oversight gets sloppy, even a recycling job can turn into something much worse. Good intentions need tight controls, or resourceful people will find the gaps.
Activate Intelligence Layer
Institutional-grade structural analysis for this article.





