April 15, 2026

Ceiling PCs, floor-level oversight

Ohio prison inmates 'built computers and hid them in ceiling

Ceiling PCs spark hire‑them vs. security‑fail smackdown

TLDR: Two Ohio inmates secretly built and hid PCs in a prison ceiling and hopped online until odd traffic exposed them. Commenters clash between praising their smarts and dunking on outdated news, while roasting prison security for letting scrap parts and live ports turn into a DIY tech caper.

Two Ohio inmates didn’t just tinker—they allegedly built full-on personal computers from scrap in a prison recycling program and stashed them in the ceiling. They plugged into the prison’s internet, got flagged by unusual web traffic on a contractor’s account, and were busted when IT followed a cable straight up into the tiles. Investigators say the hidden machines held porn, DIY guides for bad things, and internal pass records—cue outrage and awe. The community reaction? Pure chaos. One camp is cheering the sheer ingenuity: “That’s some fine problem solving,” with others saying the system failed these would‑be techs and someone should give them a job when they’re out. Another camp fires back that this is ancient history—“Nearly a decade old story now,” one user groans, while another simply timestamps it as [2016]. Meanwhile, nerd nostalgia pops up with a wink to old‑school archives like textfiles.com, sparking retro-internet jokes. Between the praise and the eye-rolls, the real heat lands on prison oversight: how did unsupervised inmates get parts, power, and an active network port? The thread turns into a courtroom of hot takes—half “hire them,” half “how is your security this bad?”—with a side of throwback meme energy.

Key Points

  • Two Ohio inmates built two computers from recycled parts in a prison work program and hid them in a training room ceiling.
  • An email alert on 3 July 2015 flagged unusual internet use from a contractor’s account not scheduled to work.
  • The prison’s proxy server blocked file-sharing, and the user spent hours trying to bypass restrictions, triggering investigation.
  • IT staff traced a network cable to the ceiling and found two hidden PCs connected to the prison network.
  • A state report detailed stored inmate pass records and prohibited materials; one IT employee violated procedures, and corrections officials pledged safeguards.

Hottest takes

"Nearly a decade old story now" — Anonbrit
"That's some fine problem solving" — Quarrelsome
"Creative.. someone should hire this guy" — t1234s
Made with <3 by @siedrix and @shesho from CDMX. Powered by Forge&Hive.