An enthusiast recently "jailbroke" a laptop used by prison inmates for
educational courses, ultimately resulting in sensitive passwords being
posted online. This has now spurred prison officials to confiscate
1,200 laptops from incarcerated students.
When we reported on the infamous [1]"prison laptop" (or Securebook 5)
in February, it was covering Twitter user @zephry_wenting busting open
the device by painstakingly replacing the BIOS without removing power
to the board and then replacing the default OS by soldering a USB hub
onto the laptop. Following the installation of Ubuntu MATE and
FreeDoom, one would assume that was the sunsetted end of our pleasant
laptop prison break escapade.
Unfortunately, it seems to have collapsed into a series of events,
including prisoners having their directly acquired Securebook 5s taken
away. According to a piece by [2]Open Campus Media, this happened
because [3]Hackaday's coverage included the default password for the
OS. The Twitter posts and YouTube videos cited are both now deleted or
made private.
Original poster [4]Wenting has already gone on record, saying, "If I
knew beforehand, I wouldn't post the original thread." Unfortunately,
the government's move to mass-confiscate prisoners' laptops (often
locking down the prisoners to do so) still came despite Justice Tech
head Jeremy Schwartz's assurance that the work of outside hackers could
not be duplicated inside prison walls.
The timing of this move is regrettable because these aren't purely
leisure devices by any measure. The laptops were taken immediately
before the Winter Quarter Finals of community college classes, which is
a pretty pivotal deadline to have your most efficient writing and
research consumption tool taken from you. These laptops could run
outside of a dock. Still, they could reportedly only upload or download
information while connected to one, meaning a lot of existing classwork
may already be permanently lost.
Say what you like about the prison-industrial complex. Still, it's at
least a little unreasonable to jeopardize the education of people
attempting to better themselves in a highly controlled environment. We
hope the students have their laptops returned or replaced with their
original files intact soon. There was no evidence before this
pre-emptive move that anyone inside prison walls was aware of the
exploit, could even be made aware of it, or would even be capable of
utilizing it to any meaningful extent.
Realistically, those who can secure their tools for adding a USB hub to
a laptop that doesn't have it inside prison walls can almost certainly
secure a regular PC or phone in the same scenario. People already
operating within the boundaries shouldn't be punished for doing so.
Join the experts who read Tom's Hardware for the inside track on
enthusiast PC tech news — and have for over 25 years. We'll send
breaking news and in-depth reviews of CPUs, GPUs, AI, maker hardware
and more straight to your inbox.
References
1.
https://www.tomshardware.com/laptops/notebook-for-prison-inmates-bought-on-ebay-justice-tech-solutions-securebook-is-locked-down-but-has-freedoom-loving-linux
2.
https://www.opencampusmedia.org/2024/03/04/an-engineer-bought-a-prison-laptop-on-ebay-then-1200-incarcerated-students-lost-their-devices/
3.
https://hackaday.com/2024/02/26/deep-dive-into-a-prison-laptop/
4.
https://twitter.com/zephray_wenting/status/1764871901975871819