This article is from the source 'independent' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at http://www.independent.co.uk/news/uk/crime/gang-orchestrated-30m-drug-deal-from-jail-using-hacked-laptops-supplied-by-the-taxpayer-10456535.html

The article has changed 4 times. There is an RSS feed of changes available.

Version 0 Version 1
Gang orchestrated £30m drug deal from jail using hacked laptops supplied by the taxpayer Gang orchestrated £30m drug deal from jail using hacked laptops supplied by the taxpayer
(35 minutes later)
A major security flaw at the heart of the prison system can be exposed today after a criminal gang conducted a £30m drug-smuggling operation from their cells – using hacked laptops supplied by the Ministry of Justice.A major security flaw at the heart of the prison system can be exposed today after a criminal gang conducted a £30m drug-smuggling operation from their cells – using hacked laptops supplied by the Ministry of Justice.
The gang’s kingpins even paid more than £1m to persuade a freelance “fixer” to get himself deliberately convicted of fraud and sent to their prison to co-ordinate the operation – which involved shipping a ton of heroin and ketamine to Britain.The gang’s kingpins even paid more than £1m to persuade a freelance “fixer” to get himself deliberately convicted of fraud and sent to their prison to co-ordinate the operation – which involved shipping a ton of heroin and ketamine to Britain.
The plotters manipulated the court system to ensure the six-strong group came together in Wandsworth prison in south London where they used computers supplied by the authorities, under a taxpayer-funded scheme to help inmates prepare their own legal cases.The plotters manipulated the court system to ensure the six-strong group came together in Wandsworth prison in south London where they used computers supplied by the authorities, under a taxpayer-funded scheme to help inmates prepare their own legal cases.
The computers’ security features were cracked by another member of the gang – an East European hacker – using a coded memory stick smuggled into the prison by a girlfriend of one of the plotters.The computers’ security features were cracked by another member of the gang – an East European hacker – using a coded memory stick smuggled into the prison by a girlfriend of one of the plotters.
A corrupt prison officer supplied a phone and other equipment to help run the operation, The Independent understands. The gang used the computers – combined with a smuggled dongle – to communicate with overseas contacts to stow the drugs on to shipping containers of legitimate operators travelling from South Asia bound for Britain.A corrupt prison officer supplied a phone and other equipment to help run the operation, The Independent understands. The gang used the computers – combined with a smuggled dongle – to communicate with overseas contacts to stow the drugs on to shipping containers of legitimate operators travelling from South Asia bound for Britain.
The plot was only possible because key players in the gang secured two of the laptops made available to inmates under a scheme known as “Access to Justice” – which allows inmates to read legal papers and write to their solicitors.The plot was only possible because key players in the gang secured two of the laptops made available to inmates under a scheme known as “Access to Justice” – which allows inmates to read legal papers and write to their solicitors.
The lax regime around the use of the computers at Wandsworth prison, Britain’s largest jail, means nearly a quarter of the laptops given out by prison authorities there over a four-year period were tampered with or stolen by prisoners.The lax regime around the use of the computers at Wandsworth prison, Britain’s largest jail, means nearly a quarter of the laptops given out by prison authorities there over a four-year period were tampered with or stolen by prisoners.
A general view of Wandsworth Prison (Getty)
The gang of fraudsters, hackers, robbers and drug smugglers easily bypassed the simple security on the computers that allowed them to sign on as administrators and turned the computers into internet-enabled drug smuggling hubs.The gang of fraudsters, hackers, robbers and drug smugglers easily bypassed the simple security on the computers that allowed them to sign on as administrators and turned the computers into internet-enabled drug smuggling hubs.
Prison insiders said that members of the gang were able to use computers openly without fear of confiscation because of the chaotic regime in place at the prison at the time of the smuggling operation, thought to have been around 2010-13.Prison insiders said that members of the gang were able to use computers openly without fear of confiscation because of the chaotic regime in place at the prison at the time of the smuggling operation, thought to have been around 2010-13.
If there was a raid by prison guards, the gang could hide what they had done to the computer within 30 seconds and return it to its unadapted state, it is understood.If there was a raid by prison guards, the gang could hide what they had done to the computer within 30 seconds and return it to its unadapted state, it is understood.
A Freedom of Information request revealed that during that four-year period, nine of the 38 laptops distributed under the scheme at Wandsworth Prison were either misused, retooled or, in one case, disappeared, according to the statistics from the National Offender Management Service.A Freedom of Information request revealed that during that four-year period, nine of the 38 laptops distributed under the scheme at Wandsworth Prison were either misused, retooled or, in one case, disappeared, according to the statistics from the National Offender Management Service.
Despite authorities knowing of the repeated breaches, the Ministry of Justice has continued with the Access to Justice scheme, prompting Labour to call for an inquiry into the scandal. “It’s an extremely serious breach,” the shadow prisons minister Jenny Chapman told The Independent. “This needs an immediate investigation and it’s rather symptomatic of the system in its current state.Despite authorities knowing of the repeated breaches, the Ministry of Justice has continued with the Access to Justice scheme, prompting Labour to call for an inquiry into the scandal. “It’s an extremely serious breach,” the shadow prisons minister Jenny Chapman told The Independent. “This needs an immediate investigation and it’s rather symptomatic of the system in its current state.
“We cannot allow inmates’ access to equipment that should be a privilege to be abused in this way. The public will be rightly concerned and the Ministry of Justice needs to act immediately to deal with it.“We cannot allow inmates’ access to equipment that should be a privilege to be abused in this way. The public will be rightly concerned and the Ministry of Justice needs to act immediately to deal with it.
“They need to consider the extent of this and how widespread it is. They have to step up their efforts to prevent this type of abuse. Overcrowded and understaffed – these are just the kind of security breaches we find when staff are working under pressure.”“They need to consider the extent of this and how widespread it is. They have to step up their efforts to prevent this type of abuse. Overcrowded and understaffed – these are just the kind of security breaches we find when staff are working under pressure.”
In two cases, a laptop was taken from a prisoner after it was found to be in “possession of multiple unauthorised articles”, according to the response to the FoI request. The log continued: “Carried out basic check on laptop and found all settings changed. (USB ports reactivated and administrator’s account accessed.)”In two cases, a laptop was taken from a prisoner after it was found to be in “possession of multiple unauthorised articles”, according to the response to the FoI request. The log continued: “Carried out basic check on laptop and found all settings changed. (USB ports reactivated and administrator’s account accessed.)”
That technique appeared to be similar to the plot involving the drug smugglers but it was not immediately clear if they were the same machines. Nobody has ever been arrested for the drug-smuggling plot and the key players are currently out of prison.That technique appeared to be similar to the plot involving the drug smugglers but it was not immediately clear if they were the same machines. Nobody has ever been arrested for the drug-smuggling plot and the key players are currently out of prison.
The plotters, led by British Asians, were able to gather at Wandsworth after the “fixer” – a transport expert – ensured he was jailed by one of the south London courts that serves the category-B local prison.The plotters, led by British Asians, were able to gather at Wandsworth after the “fixer” – a transport expert – ensured he was jailed by one of the south London courts that serves the category-B local prison.
During the operation, the plotters were kept on the same wing and worked together to arrange for holdalls containing the drugs to be hidden in a shipping container at the South Asian port and then covertly removed when the vessel arrived in Britain.During the operation, the plotters were kept on the same wing and worked together to arrange for holdalls containing the drugs to be hidden in a shipping container at the South Asian port and then covertly removed when the vessel arrived in Britain.
One container holding a ton of drugs was listed as carrying furniture. The gang was able to bring another container holding furniture into the British port by lorry, swap it with the one carrying the drugs and then leave without attracting the attention of customs officers.One container holding a ton of drugs was listed as carrying furniture. The gang was able to bring another container holding furniture into the British port by lorry, swap it with the one carrying the drugs and then leave without attracting the attention of customs officers.
In total, drugs with an estimated street value of £30m were shipped, unloaded and distributed to dealers in London while the key plotters were all in prison and co-ordinating the operation, it is understood.In total, drugs with an estimated street value of £30m were shipped, unloaded and distributed to dealers in London while the key plotters were all in prison and co-ordinating the operation, it is understood.
It is not clear how many laptops were being used by the 86,000 people held in the 130 prisons in England and Wales. But the high number of breaches in the scheme at Wandsworth pointed to the likelihood of more widespread abuses across the prison estate.It is not clear how many laptops were being used by the 86,000 people held in the 130 prisons in England and Wales. But the high number of breaches in the scheme at Wandsworth pointed to the likelihood of more widespread abuses across the prison estate.
The prison had 12 laptops that were handed out to prisoners after they were assessed by the prison’s legal and security departments, according to a 2011 report by prison inspectors. They were loaned out for around three months but it could be longer and were subject to random inspections. The prison had 12 laptops that were handed out to prisoners after they were assessed by the prison’s legal and security departments, according to a 2011 report by prison inspectors. They were loaned out for around three months but it could be longer and were subject to random inspections. 
The National Offender Management Service said “it might only be needed to view one piece of evidence, for example, and so will be withdrawn as soon as possible afterwards.” It added: “Where the governor decides that a prisoner is eligible for a2J [Access to Justice], the default position is to allow read-only access…. There may be circumstances where enhanced access is justified and a governor must assess that locally and apply any necessary restrictions to manage the increased risk. Please note enhanced access will never include access to the internet.”The National Offender Management Service said “it might only be needed to view one piece of evidence, for example, and so will be withdrawn as soon as possible afterwards.” It added: “Where the governor decides that a prisoner is eligible for a2J [Access to Justice], the default position is to allow read-only access…. There may be circumstances where enhanced access is justified and a governor must assess that locally and apply any necessary restrictions to manage the increased risk. Please note enhanced access will never include access to the internet.”
But it revealed that authorities there removed one laptop which had held information with the potential for corruption including an “inappropriate Word document around a member of staff” and other unauthorised files. In other cases, prisoners were found to be loaning laptops to other inmates.But it revealed that authorities there removed one laptop which had held information with the potential for corruption including an “inappropriate Word document around a member of staff” and other unauthorised files. In other cases, prisoners were found to be loaning laptops to other inmates.
Prison insiders said that most warders on duty on the wings had little idea which inmates had been assigned the computers and for how long, which meant they could easily be swapped.Prison insiders said that most warders on duty on the wings had little idea which inmates had been assigned the computers and for how long, which meant they could easily be swapped.
Although the smuggling of smartphones into prisons is rife, the plot using Ministry of Justice computers had the advantage for the criminals of using equipment allowed in prison, meaning that it would not have to be hidden from view.Although the smuggling of smartphones into prisons is rife, the plot using Ministry of Justice computers had the advantage for the criminals of using equipment allowed in prison, meaning that it would not have to be hidden from view.
The National Crime Agency warned in May that its intelligence suggested that criminals were operating as co-ordinators or planners for new offences while behind bars.The National Crime Agency warned in May that its intelligence suggested that criminals were operating as co-ordinators or planners for new offences while behind bars.
Its annual threat assessment focused on the use of smartphones that had been smuggled into prisons and slipped over during visits, or delivered by drone.Its annual threat assessment focused on the use of smartphones that had been smuggled into prisons and slipped over during visits, or delivered by drone.
Nick Hardwick, HM Chief Inspector of Prisons, said last year that it was easy for prisoners to get hold of illegal smartphones in prisons to plan crimes and do drug deals.Nick Hardwick, HM Chief Inspector of Prisons, said last year that it was easy for prisoners to get hold of illegal smartphones in prisons to plan crimes and do drug deals.
“I think right now the system’s reactions to this kind of abuse and illegal use is too slow and complacent,” he said in a speech in June 2014.“I think right now the system’s reactions to this kind of abuse and illegal use is too slow and complacent,” he said in a speech in June 2014.
“Frankly if President Obama can listen to Angela Merkel’s mobile telephone calls I would have thought we could keep a check on what Fletcher and Godber are up to in HMP Slade.”“Frankly if President Obama can listen to Angela Merkel’s mobile telephone calls I would have thought we could keep a check on what Fletcher and Godber are up to in HMP Slade.”
Peter Dawson, deputy director of the Prison Reform Trust, which has campaigned for more widespread use of IT for inmates, said: “Providing some prisoners with access to legal documents electronically is an inescapable duty for the Prison Service.Peter Dawson, deputy director of the Prison Reform Trust, which has campaigned for more widespread use of IT for inmates, said: “Providing some prisoners with access to legal documents electronically is an inescapable duty for the Prison Service.
“It will only get more important as fewer defendants have legal aid, and as the Government’s programme to haul the court process into the 21st century gathers pace.“It will only get more important as fewer defendants have legal aid, and as the Government’s programme to haul the court process into the 21st century gathers pace.
“Risk of abuse can be limited by secure access and effective monitoring. If the Prison Service never found evidence of some prisoners behaving badly, it would mean its checks were either non-existent or ineffective.”“Risk of abuse can be limited by secure access and effective monitoring. If the Prison Service never found evidence of some prisoners behaving badly, it would mean its checks were either non-existent or ineffective.”
The Ministry of Justice said: “Prisons are required to provide secure laptops to a minority of offenders facing trial so they can view legal material relating to their case.The Ministry of Justice said: “Prisons are required to provide secure laptops to a minority of offenders facing trial so they can view legal material relating to their case.
“The computers do not enable prisoners to access any other part of the National Offender Management Service system and internet access is disabled.“The computers do not enable prisoners to access any other part of the National Offender Management Service system and internet access is disabled.
“We will always take action against those attempting to break the rules and offenders face prosecution if they use equipment inappropriately.”“We will always take action against those attempting to break the rules and offenders face prosecution if they use equipment inappropriately.”
The service said that new, more secure laptops were starting to be supplied to prisoners. Prisoners needed to have secure IT as the court process switches to an increasingly electronic system, it said.The service said that new, more secure laptops were starting to be supplied to prisoners. Prisoners needed to have secure IT as the court process switches to an increasingly electronic system, it said.
“Work is under way to look at the best way in which this can be done at minimal cost and with maximum security,” it added.“Work is under way to look at the best way in which this can be done at minimal cost and with maximum security,” it added.