[sleuthkit-users] Microsoft's USB thumb drive forensic tool
Brought to you by:
carrier
From: DePriest, J. R. <jrd...@gm...> - 2008-04-29 19:37:39
|
http://www.vnunet.com/vnunet/news/2215492/microsoft-builds-hard-drive >From the story: <quote>Microsoft has built a USB thumb drive for the police that scans computer hard drives. The Computer Online Forensic Evidence Extractor can be used in police raids to map hard drives and decrypt passwords without shutting the computer down and losing evidence. The device was shown off at a three-day security conference for 350 law enforcement officials in Redmond, Washington. "These are things in which we invest substantial resources, but not from the perspective of making money," Microsoft general counsel Brad Smith told the Seattle Times. "We're doing this to help ensure that the internet stays safe." The thumb drive has 150 commands and can log hard drive activity, check on surfing history and decrypt some passwords. Microsoft has distributed the device for free since last year, and claims that it is in use by over 2,000 officers in 15 countries. However, Smith acknowledged that there is a financial upside for Microsoft in giving away the device, since it makes money selling ancillary software and services. Microsoft has been holding law enforcement meetings since 2006 in an effort to educate police about cyber-crime.</quote> Does anyone know more about what this device actually *does* and what software it uses? Google (http://www.google.com/search?q=Computer%20Online%20Forensic%20Evidence%20Extractor&start=0) has plenty to say, but I'd rather hear something first hand. -Jason -- NOTICE: Reading this email message requires root privileges which you do not appear to possess. Sorry, dude. |