Johnston told investigators that Spriggs rebuilt the computers but that he took them from the RET3 area to a training room.
“Johnson admitted that he placed the two computers in the ceiling,” the report stated. “Johnston admitted to investigators that he used the computer to text message his mother ... Johnston also confirmed to investigators that he downloaded pornography that was found on a thumb drive in the possession of (another inmate).”
Johnston looked over the shoulder of a former MCI employee-turned RET3 contractor to learn a password to access a prison database. There, he selected a young inmate with a lengthy sentence, bypassed security measures and obtained the inmate’s birth date and Social Security number. He applied for five credit and debit cards in the prisoner’s name. He used a mailing address in the 1400 block of Willamet Road in Kettering, which his mother, Karen Galienne, provided in a May 28, 2015, text to his illicit prison computer. “Wow that sounds really close to your house,” Johnston replied.
A review of 17 telephone calls made between April 26 and Aug. 9, 2015, between Johnston and Galienne showed that: “Galienne informed Johnston that she had received a notice from Chase that the credit card ... was declined; Galienne informed Johnston that she had received a Visa debit card ... and read the card number, expiration date and activation code to Johnston,” the report stated.
When the Ohio State Highway Patrol raided Galienne’s home on Nov. 5, 2015, they found a Visa debit card issued by MetaBank issued in the name of the selected prisoner and mailed to the address of Galienne’s neighbor, which was the same address provided to Johnston in the text.
“Galienne admitted to investigators that she had provided the address ... to her son, inmate Johnston, through a text message,” the report stated. When asked why Johnston did not put the debit card in her name, she said, “because he didn’t want to put my name on anything.”
Johnston told investigators the plan was to file false tax returns and to have the money funneled to the debit card.
MetaBank, based in Sioux Falls, South Dakota, confirmed they received a debit card application on June 21, 2015, from an ODRC internet protocol address, and that the debit card was activated July 16, 2015, also from an ODRC IP address. The applications for credit/debit cards to four other banks were declined, according to the report.
The Ohio Inspector General found that the prison filed to supervise inmates; protect information technology resources; and follow password security policy among other infractions. The findings were forwarded to the Marion County Prosecutor’s Office and the Ohio Ethics Commission for consideration.
HAVE A TIP? Contact the 24-hour line 937-225-2329 or email@example.com
DOWNLOAD our free mobile apps for breaking news and weather