Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

Microsoft distributes flash drive with magic abilities

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU
 
crimsonblue Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 07:04 PM
Original message
Microsoft distributes flash drive with magic abilities
Edited on Wed Apr-30-08 07:06 PM by crimsonblue
By Benjamin J. Romano

Seattle Times technology reporter source

Microsoft has developed a small plug-in device that investigators can use to quickly extract forensic data from computers that may have been used in crimes.

The COFEE, which stands for Computer Online Forensic Evidence Extractor, is a USB "thumb drive" that was quietly distributed to a handful of law-enforcement agencies last June. Microsoft General Counsel Brad Smith described its use to the 350 law-enforcement experts attending a company conference Monday.

The device contains 150 commands that can dramatically cut the time it takes to gather digital evidence, which is becoming more important in real-world crime, as well as cybercrime. It can decrypt passwords and analyze a computer's Internet activity, as well as data stored in the computer.

It also eliminates the need to seize a computer itself, which typically involves disconnecting from a network, turning off the power and potentially losing data. Instead, the investigator can scan for evidence on site.

More than 2,000 officers in 15 countries, including Poland, the Philippines, Germany, New Zealand and the United States, are using the device, which Microsoft provides free.

"These are things that we invest substantial resources in, but not from the perspective of selling to make money," Smith said in an interview. "We're doing this to help ensure that the Internet stays safe."

Law-enforcement officials from agencies in 35 countries are in Redmond this week to talk about how technology can help fight crime. Microsoft held a similar event in 2006. Discussions there led to the creation of COFEE.

Smith compared the Internet of today to London and other Industrial Revolution cities in the early 1800s. As people flocked from small communities where everyone knew each other, an anonymity emerged in the cities and a rise in crime followed.

The social aspects of Web 2.0 are like "new digital cities," Smith said. Publishers, interested in creating huge audiences to sell advertising, let people participate anonymously.

That's allowing "criminals to infiltrate the community, become part of the conversation and persuade people to part with personal information," Smith said.

Children are particularly at risk to anonymous predators or those with false identities. "Criminals seek to win a child's confidence in cyberspace and meet in real space," Smith cautioned.

Expertise and technology like COFEE are needed to investigate cybercrime, and, increasingly, real-world crimes.

advertising

"So many of our crimes today, just as our lives, involve the Internet and other digital evidence," said Lisa Johnson, who heads the Special Assault Unit in the King County Prosecuting Attorney's Office.

A suspect's online activities can corroborate a crime or dispel an alibi, she said.

The 35 individual law-enforcement agencies in King County, for example, don't have the resources to investigate the explosion of digital evidence they seize, said Johnson, who attended the conference.

"They might even choose not to seize it because they don't know what to do with it," she said. "... We've kind of equated it to asking specific law-enforcement agencies to do their own DNA analysis. You can't possibly do that."

Johnson said the prosecutor's office, the Washington Attorney General's Office and Microsoft are working on a proposal to the Legislature to fund computer forensic crime labs.

Microsoft also got credit for other public-private partnerships around law enforcement.

Jean-Michel Louboutin, Interpol's executive director of police services, said only 10 of 50 African countries have dedicated cybercrime investigative units.

"The digital divide is no exaggeration," he told the conference. "Even in countries with dedicated cybercrime units, expertise is often too scarce."

He credited Microsoft for helping Interpol develop training materials and international databases used to prevent child abuse.

Smith acknowledged Microsoft's efforts are not purely altruistic. It benefits from selling collaboration software and other technology to law-enforcement agencies, just like everybody else, he said.

------------------------------
Wait till TSA gets their hands on these babies....

Edit: I know I didn't use the article title from the original source, but whatever.
Printer Friendly | Permalink |  | Top
rfranklin Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 07:08 PM
Response to Original message
1. This will be used by criminals in and out of government...
You probably can buy a knockoff or an original even now on the black market (or the back door of Microsoft.) It will be used to extract pin codes and passwords as well as as other personal information that will then be used to empty your bank account. And it will be up to the hapless victims to try and reclaim their identities with no help from the authorities.
Printer Friendly | Permalink |  | Top
 
HysteryDiagnosis Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 07:11 PM
Response to Reply #1
5. I smell a class action suit that will leave Bill Gates penniless and
forced to run Linux on his pc.


Printer Friendly | Permalink |  | Top
 
HysteryDiagnosis Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 07:09 PM
Response to Original message
2. Hey, now why didn't I think of that muses GWB..... I can still
dance, can't I??

Printer Friendly | Permalink |  | Top
 
Mojorabbit Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 07:10 PM
Response to Original message
3. Send them to the
White House computers to extract the emails!
Printer Friendly | Permalink |  | Top
 
annabanana Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 07:11 PM
Response to Original message
4. Quick!!
Get that COFEE over to the White House, pronto!
Printer Friendly | Permalink |  | Top
 
Sanctified Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 07:12 PM
Response to Original message
6. And it only works on Windows based systems. n/t
Printer Friendly | Permalink |  | Top
 
crimsonblue Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 07:14 PM
Response to Reply #6
7. I'm not sure on that one...
the tech blogs I've been on today are kinda iffy as to whether it will work on Macs (plus there is macpicklock anyway). The only "safe" way is a Linux distro plus trucrypt or something similar.
Printer Friendly | Permalink |  | Top
 
Sanctified Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 07:20 PM
Response to Reply #7
10. The forensic tools that it uses is stuff that is already available commercialy
and anyone can get access to them. Microsoft did not even create any of the forensic tools, they just packaged them all up and put them on a flash drive with a script that allows you to run them one after the other.
Printer Friendly | Permalink |  | Top
 
crimsonblue Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 07:26 PM
Response to Reply #10
12. It's the wide availability of these tools now made possible..
that freaks me out. It will not be very long before every police officer and TSA agent has one. That scares me.
Printer Friendly | Permalink |  | Top
 
DavidMS Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 08:07 PM
Response to Reply #12
13. Encryption is a good thing
Strong encryption will prevent some of these attacks.

Look at various tools even Microsoft builds one into their OS. The best probably is from PGP or TrueCrypt (Free).

Just don't forget your password and backup your data. Damaged encrypted files cannot be recovered.

Many business laptops and desktops come with TPM modules (they can be used for great evil) but also support encryption of the entire disk.
Printer Friendly | Permalink |  | Top
 
HysteryDiagnosis Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 07:14 PM
Response to Original message
8. Even if you delete cookies, delete history and all the rest. There
is an "Index file" in the cookies folder that has an index of all sites visited. The only way to clear this baby is to boot to dos and save a blank file of the same name in the cookies folder. In Win2K it's possible to boot to dos with the recovery console, in XP not too sure but there must be a way.
Printer Friendly | Permalink |  | Top
 
Trillo Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 07:16 PM
Response to Original message
9. 10 years ago the best Internet security advice was to remain anonymous,
that was when the Internet was newer to more people. Now, I'm reading more and more that those with "false identities" are considered up to no good by security experts. Such hypocrisy.
Printer Friendly | Permalink |  | Top
 
Richard Steele Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 07:25 PM
Response to Original message
11. Dang it, I thought you were talking about real magic! I'm very disappointed. nm
Printer Friendly | Permalink |  | Top
 
sakabatou Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 08:50 PM
Response to Original message
14. It also turns Mac users into frogs
Printer Friendly | Permalink |  | Top
 
Elwood P Dowd Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 09:06 PM
Response to Reply #14
15. Ribit
:hippie:
Printer Friendly | Permalink |  | Top
 
hunter Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 10:05 PM
Response to Original message
16. From thumb drives to thumb screws in some nations.
Yes, this confirms you are an enemy of the homeland! You are under arrest!

And when they finally take the black canvas sack off of your head after a long flight in the night you are sitting naked in a trash can full of icewater and forced to listen to "Wildfire" over and over and over again.

She comes down from Yellow Mountain
On a dark, flat land she rides
On a pony she named Wildfire
With a whirlwind by her side
On a cold Nebraska night

Oh, they say she died one winter
When there came a killing frost...


Printer Friendly | Permalink |  | Top
 
Canuckistanian Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 10:13 PM
Response to Original message
17. And the evidence they CAN'T use will be discarded immediately
Right? Right?

Bueller?
Printer Friendly | Permalink |  | Top
 
crimsonblue Donating Member (1000+ posts) Send PM | Profile | Ignore Wed Apr-30-08 11:14 PM
Response to Reply #17
18. 'of course*'
*(No.)
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Sat May 11th 2024, 01:35 AM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Archives » General Discussion (1/22-2007 thru 12/14/2010) Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC