Cybercriminal teen hacked prison mainframe while taking IT course

Details emerge at industrial tribunal

One of the UK's most skilled and successful convicted cybercriminals was allegedly able to hack into his prison's mainframe after being allowed to take an IT course, an industrial tribunal hearing has heard.

The extraordinary events at the Her Majesty's Young Offender's institution 'Isis' in London emerged at an unfair dismissal claim brought by former Kensington and Chelsea College IT teacher Michael Fox, sacked - he claims in part - for allowing inmate Nicholas Webber, then 21, to break into the prison's educational server while under his instruction in 2011.

According to The Daily Mail Although Fox was reportedly cleared of responsibility a year ago by his college employer, he believes the incident contributed to his being made redundant later in the year.

Given Webber's prodigious hacking skills, why he was allowed to attend the IT course without careful supervision remains a mystery; anyone studying his criminal record sheet or the infamous image (inset) of hm smoking a cigarette in front of hs keyboard would have quickly clocked the risks.

In 2009 Webber and his accomplices in the notorious British gang were arrested by chance after attempting to pay a £1,000 London hotel bill using a stolen credit card.

After studying a laptop found in their possession, police discovered that the men had access to 100,000 stolen credit cards worth an estimated £12 million ($18 million).

Webber and fellow hacker Ryan Thomas, 18, jumped bail before being arrested when they returned to the UK from Spain in early 2010. Webber was eventually sentenced to five years in prison for his activities.

It is not believed that Webber did any serious damage to the HMP Isis prison mainframe while accessing it during the lesson although what he was able to access during the alleged probe remains unclear.

Fox argued to the tribunal that he should not be held responsible for the incident as he was not aware that Webber was convicted for hacking offences. The hearing is set to continue next month.

The incident has a conceptual similarity to the embarrassing problems that affected Glenochil high-security prison in Scotland in 2005, when a state-of-the-art keyless PIN and fingerprint system allowing prisoners to move around the complex was abandoned after being reverse engineered (the polite term) by prisoners.

Having wasted £3 million on the system, the prison reportedly returned to the more reliable and cheaper option of using keys.

Join the CSO newsletter!

Error: Please check your email address.

Tags Personal Techsecurity

More about Kensington

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by John E Dunn

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place