Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Software Microsoft Security

Microsoft COFEE Leaked 171

54mc writes "Crunchgear reports that Microsoft's long-searched-for forensics tool, COFEE, has been leaked. The tool started on a small, private tracker, but has since worked its way to The Pirate Bay. Not all those who have gotten hold of it are enthused, and reviews have ranged from 'disappointing' to 'useless.' From the article: 'You have absolutely no use for the program. It's not something like Photoshop or Final Cut Pro, an expensive application that you download for the hell of it on the off-chance you need to put Dave Meltzer's face on Brett Hart's body as part of a message board thread. No, COFEE is 100 percent useless to you.'"
This discussion has been archived. No new comments can be posted.

Microsoft COFEE Leaked

Comments Filter:
  • by smallfries ( 601545 ) on Sunday November 08, 2009 @10:08AM (#30021324) Homepage

    It's a bit short-sighted to say that nobody does. I'm sure there are lots of people out there with material on their machines that they wouldn't want a law enforcement officer to find. This tool would be perfect for their needs.

  • by nurb432 ( 527695 ) on Sunday November 08, 2009 @10:16AM (#30021374) Homepage Journal

    So, don't run windows, encrypt your drive with hidden partitions and turn the thing off when the cops arrive.

  • by Anonymous Coward on Sunday November 08, 2009 @10:16AM (#30021384)
    From the description on the link site, which I think was quoting MS about what does an untrained beat cop do when they find digital evidence? Step back, don't touch it, and call in the law-enforcement folks who are trained and won't destroy the evidence. It's hard enough to get a jury to understand evidence pulled off of a computer - these folks see viruses or similar on their own machines that "just magically appears" so surely the defense's argument that the kiddie porn just magically appeared on his client's machine is completely possible. Having the defense say, "Mr. Officer, you admit to having no background in computer forensics, and you admit to not knowing what the program does. You admit to clicking on the talking paperclip when it said, "I see you are trying to bust a felon. Would you like me to help you?" but have no idea what then happened? Your honor, I move that the case be dismissed because the so-called evidence has obviously not followed the proper evidentiary chain." I'm posting anon because I've gone through the proper training at places like FLETC [fletc.gov] and it's something they drill into us, time and time again. If you're not sure you're qualified to handle investigating the content on the computer, don't touch it. Get someone who is qualified.
  • Bloody DUH (Score:5, Insightful)

    by Shoten ( 260439 ) on Sunday November 08, 2009 @10:42AM (#30021628)

    Well, of course it's useless to most of them...but that has nothing to do with whether or not COFEE is any good. Let's face it; how many casual downloaders are going to need a forensics toolkit? They already have access to all of their own files, and already know what they've been doing with their system. And COFEE is not meant to be a "point and shoot" system; it's really meant for professionals that know what they're looking for to some degree. So getting a copy and using it doesn't instantly give you some insight into how computer forensics work.

  • by ledow ( 319597 ) on Sunday November 08, 2009 @10:55AM (#30021740) Homepage

    I would think even mere insertion of a USB device into a computer could lead to all sorts of problems - what if that USB key had a virus that transferred itself to the PC and then deleted itself from the USB device? The fact that this is a bog-standard set of files means that someone has to put these programs onto a writable USB drive (it's possible it's write-once but I would be dubious of that actually being the case) and then plug it into a computer - exactly the action that companies block by default because of the potential for rogue programs to be introduced and destroy/modify data.

    Want to put someone in jail? Put something illegal on that USB drive, plug it into their computer with an autorun script that copies itself over and then deletes itself (and the script) from the USB drive. Then claim that it was a *different* drive you put in and submit a "clean" drive as evidence if they demand to see it.

    Not to mention that actually doing *anything* on the original PC is damn stupid anyway but relying on a USB stick to run it? That's got to be asking for trouble. Oh, and disable USB and you've just stopped that attack.

    I was always told that *anything* capable of writing to the drive or modifying the data you're trying to access was a no-no... that's why they image the drives through special "read-only" adaptors (apparently harder with SATA nowadays) and then analyse the image. Saving transient information onto a writable USB stick by execution of a program from that stick? Sounds like a recipe for disaster. That's gotta touch your swap or do something to memory in order to execute and proving that happened cleanly and provided a complete accurate copy of the contents of RAM/disk/swap before you plugged it in is probably impossible.

  • by pla ( 258480 ) on Sunday November 08, 2009 @11:03AM (#30021806) Journal
    It's a bit short-sighted to say that nobody does. I'm sure there are lots of people out there with material on their machines that they wouldn't want a law enforcement officer to find. This tool would be perfect for their needs.

    As a fan of maximizing my privacy, I would find such a tool useful just for auditing the effectiveness of my standard cleanup procedures.

    You don't need to break the law to have an interest in others not seeing what you do with your computer. Whether making sure you haven't left personal financial information unencrypted on your machine, or have accidentally clicked "yes" to have your browser remember your passwords, or simply your taste in porn stars... All legal, yet things you probably would rather not leave lying around for anyone other than yourself.

    Now, aside from that, don't forget that police exist to help prosecute cases, not to protect us or find the guilty party or any fluffy BS like that. Once they have you in their sights, the less they can dig up, the better. "Good news - Your alibi checked out, you didn't kill that girl. Bad news - Your computer proves that you played poker online once last year, enjoy your 2+ year federal sentence".

    And hey, who better to know where Windows leaks information than Microsoft itself? Not that I would trust them as my sole source of privacy maintenance, but as I said, for auditing "best practices", such a tool would appear fairly useful.
  • by Baron_Yam ( 643147 ) on Sunday November 08, 2009 @11:07AM (#30021846)

    Most warrants are specific... not that I'd want to defend myself on that basis, but I'm sure a good lawyer could help you if you were investigated for child porn and the only thing they find is some evidence of Internet gambling.

    On the other hand, I'd stop the Internet gambling right away, because you know they'd be looking for a way to justify getting you for that having 'lost' the child porn case.

  • Ummm.... well.... (Score:5, Insightful)

    by Le Marteau ( 206396 ) on Sunday November 08, 2009 @11:13AM (#30021894) Journal

    > No, COFEE is 100 percent useless to you.'"

    Yes, and the software that runs voting machines is "useless to us", too.

    I think the submitter is missing the point. This (probably) closed-source tool by Microsoft (that bears repeating... by MICROSOFT) is going to be used by law enforcement to help throw people in jail. If for no 'practical' use, now that COFFEE is leaked, people will be able to reverse-engineer it an see exactly what it is doing, and how. That is a good thing.

  • by Anonymous Coward on Sunday November 08, 2009 @11:22AM (#30021974)

    I agree. Using the software may not prove useful, but studying the software to see how it works might be. It is said the software can decrypt passwords and access otherwise inaccessible files. If true, that would be a major security hole that black hats could exploit, so the public has the right to know what exactly COFEE does, how it works, and how to defend their systems from it and similar software.

  • by Angostura ( 703910 ) on Sunday November 08, 2009 @11:45AM (#30022182)

    If only you'd bothered to write that in the summary, rather than the clever-clever "You don't need this" shenanigans. Half these initially posts could have been avoided.

  • by supersat ( 639745 ) on Sunday November 08, 2009 @12:35PM (#30022662)
    There's no viruses or nasties for it because NOTHING RUNS ON IT. ;)
  • by Anonymous Coward on Sunday November 08, 2009 @01:11PM (#30023054)

    Once again, slashdotters seem to think that because something involves a computer it's a new concept, rather than one that has been around since the beginning of civilization.

    How is that ANY different than any other case where someone given the task of investigating a crime decides to set up a frame instead? It's not. Planting files on someone's hard drive is exactly like planting fingerprints. Or before fingerprints, planting a gun. Or before guns, planting a weapon with blood on it.

    Please stop thinking that this is some new problem that you're solving, or that society is going to shut down because this is an unsolvable problem (which it is to an extent, and always has been since humans first stood upright).

  • Re:But (Score:5, Insightful)

    by hansraj ( 458504 ) on Sunday November 08, 2009 @01:45PM (#30023398)

    Really... why should we have to look up something stated in the summary as "100% useless to us"? Thanks fuck head!

    Because:
    1) You are wondering what is the damn thing in the first place (like OP did), and
    2) You want to make your own opinion.

    No one is forcing you to read through the wikipedia entry. I hope, for the sake of people around you, that you don't flip out as easily in real life.

  • Re:But (Score:5, Insightful)

    by edumacator ( 910819 ) on Sunday November 08, 2009 @02:31PM (#30023834)

    Responsible Mods needed...

    Come on...this guy responds to someone, who calls him a fuck head for providing a link to information connected to the post, in a calm and measured way, and somehow he gets modded flamebait?

    If that doesn't get fixed, I've lost the last little bit of trust I have in the /. mod system.

The use of money is all the advantage there is to having money. -- B. Franklin

Working...