Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Microsoft Gives Out Back Door Key
Strategy Page ^ | 5/2/08

Posted on 05/02/2008 5:02:14 PM PDT by Dawnsblood

Last Summer, Microsoft Corporation quietly introduced a powerful tool for getting past security on laptops and PCs running the Windows operations system (which about 90 percent do). The device is a USB thumb drive called COFEE (Computer Online Forensic Evidence Extractor). When you capture an enemy computer, you plug in COFEE and then use over a hundred software to quickly get whatever information is on the machine. COFEE can quickly reveal passwords, decrypt files, reveal recent Internet activity and much more. A lot of this can be done without COFEE, but with the Microsoft device, intelligence collection is a lot faster.

Microsoft has distributed thousands of COFEE devices to police and military intelligence personnel in the United States, and some foreign countries. COFEE was developed mainly to assist the investigation of Internet based crime. But military intelligence operators find it very useful in uncovering enemy plans. Islamic terrorists love their laptops, and never go killing without them.


TOPICS: Extended News; Government; News/Current Events; Technical
KEYWORDS: cofee; microsoft; ms; privacy; security
Navigation: use the links below to view more comments.
first previous 1-2021-4041-44 next last
To: proxy_user
"It is really quite easy to disable USB drives on a Windows machine. It’s just a few registry entries, and then this device would be useless without an admin account on the target machine."

I can only assume, but I'm most certain they boot from this device and it can target the local hard drives while the host OS is offline. Just like accessing files with a 'live CD'.

21 posted on 05/03/2008 6:45:49 AM PDT by KoRn (CTHULHU '08 - I won't settle for a lesser evil any longer!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: proxy_user
I can break into an admin account in about five minutes on ANY windows machine. No, I am not going to tell you how. We make a great deal of money doing it for clients who have password issues.
22 posted on 05/03/2008 6:48:50 AM PDT by mad_as_he$$ (Sleep with one eye open, Gripping your pillow tight , Exit light , Enter night.......)
[ Post Reply | Private Reply | To 5 | View Replies]

To: proxy_user
It is really quite easy to disable USB drives on a Windows machine. It’s just a few registry entries, and then this device would be useless without an admin account on the target machine.
Except that the registry entries you mention are only relevant if you've booted into the OS on the machine. Devices like this, and other approaches like bootable CDs, have their own OS on them.

A necessary, but not sufficient, condition to security is to control physical access to the machine.

23 posted on 05/03/2008 6:54:39 AM PDT by Scutter
[ Post Reply | Private Reply | To 5 | View Replies]

To: Scutter; Natty Bumppo@frontier.net; KoRn; mad_as_he$$

My corporate laptop has an encrypted C: drive and has the USB port disabled.

If you got my laptop when it was booted, and put a USB stick in the port, the filesystem wouldn’t mount. You would have to type in a valid ID and password to get access through the keyboard. You get three tries before the account is locked.

If you got my laptop when it was not booted, you might be able to boot from the USB port, but then how would you read the encrypted C: drive?


24 posted on 05/03/2008 7:12:12 AM PDT by proxy_user
[ Post Reply | Private Reply | To 23 | View Replies]

To: proxy_user
I never said we used USB technology and I can crack your system in less than 15 minutes. I win bets with IT guys all the time over this exact scenario. Encrypted drives take longer but so far we have broken all but one. Most are encrypted by disgruntled employees that think they a screwing the company. There are so many ways into a Windows system it is sad. The fact that you think I have to enter a password and ID to get into the system shows your lack of knowledge or that you have bought the company line. He$$ I am not even a computer guy. My degrees are in Mechanical Engineering.
25 posted on 05/03/2008 7:17:27 AM PDT by mad_as_he$$ (Sleep with one eye open, Gripping your pillow tight , Exit light , Enter night.......)
[ Post Reply | Private Reply | To 24 | View Replies]

To: Dawnsblood

“you plug in COFEE and then use over a hundred software”

I guess English isn’t this person’s first language.


26 posted on 05/03/2008 7:29:07 AM PDT by CodeToad
[ Post Reply | Private Reply | To 1 | View Replies]

To: mad_as_he$$

This is an official corporate secure laptop.

I have no idea how secure it really is, I haven’t tried to crack it myself. I think you can get a backdoor to the encryption from the vendor.


27 posted on 05/03/2008 7:29:43 AM PDT by proxy_user
[ Post Reply | Private Reply | To 25 | View Replies]

To: proxy_user
If you got my laptop when it was booted, and put a USB stick in the port, the filesystem wouldn’t mount. You would have to type in a valid ID and password to get access through the keyboard. You get three tries before the account is locked.

If you got my laptop when it was not booted, you might be able to boot from the USB port, but then how would you read the encrypted C: drive?

There was a technique discovered that that involves freezing the memory chips of a computer with an encrypted HD, and moving them to another computer to be analyzed. I believe they were able to recover the encryption keys stored in memory from computers that had been powered off for as long as 20 minutes.

When you encrypt the HD, the operating system has to decrypt it. In order to do that it needs the keys in working memory. RAM is technically volatile memory, but it does exhibit some persistence. Freezing the chips seems to extend that period of persistence considerably.

28 posted on 05/03/2008 7:43:00 AM PDT by tacticalogic ("Oh bother!" said Pooh, as he chambered his last round.)
[ Post Reply | Private Reply | To 24 | View Replies]

To: proxy_user
"If you got my laptop when it was not booted, you might be able to boot from the USB port, but then how would you read the encrypted C: drive?"

I believe that's where this tool from MS could be stopped.

29 posted on 05/03/2008 8:24:37 AM PDT by KoRn (CTHULHU '08 - I won't settle for a lesser evil any longer!)
[ Post Reply | Private Reply | To 24 | View Replies]

To: mad_as_he$$

How easy is it to break True Crypt encryption?

How easy is it to break the Dell - IBM/Hitachi full drive encryption without remounting the platters?


30 posted on 05/03/2008 8:39:07 AM PDT by S.O.L.
[ Post Reply | Private Reply | To 25 | View Replies]

To: proxy_user

If I’m the NSA, I’d read your encrypted C drive :)


31 posted on 05/03/2008 9:33:07 AM PDT by Scutter
[ Post Reply | Private Reply | To 24 | View Replies]

To: Scutter

Heck, the vendor can do that. This is corporate encryption. No corporation would want to buy a product with no backdoors.


32 posted on 05/03/2008 11:07:50 AM PDT by proxy_user
[ Post Reply | Private Reply | To 31 | View Replies]

To: proxy_user
and then this device would be useless without an admin account on the target machine.

Like that's hard to get.

33 posted on 05/03/2008 1:37:06 PM PDT by Lee N. Field ("Think of it as...an eschatological intrusion." BLAMBLAMBLAMBLAM!! BOOOM!!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: hoosierham
The 4th amendment states the people shall be secure in...their papers....;oh silly me,I forgot the Bill of Rights is only a piece of paper.

Well, that, and the fact that your hard drive ISN'T paper. So, you know, obviously 4A shouldn't apply. ;-)

34 posted on 05/03/2008 2:43:12 PM PDT by Still Thinking (Typical white person)
[ Post Reply | Private Reply | To 18 | View Replies]

To: Dawnsblood

I got to get one of those!


35 posted on 05/03/2008 2:53:07 PM PDT by Publius6961 (MSM: Israelis are killed by rockets; Lebanese are killed by Israelis.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: proxy_user
If you got my laptop when it was booted, and put a USB stick in the port, the filesystem wouldn’t mount. You would have to type in a valid ID and password to get access through the keyboard. You get three tries before the account is locked.

I don't need the USB drive to mount. I also don't need keyboard access. The tools and scripts will install the hidden Administrator accounts and backdoors in non-standard file locations without creating system log entries or otherwise alerting an Intrusion Detection System (IDS) or Systems Administrator.

The really sophisticated hacks will use pseudo-random number generators to hide the Admin accounts and backdoors in the disk free space. Of course, if you regularly wipe disk free space, you could undo my work.

If you got my laptop when it was not booted, you might be able to boot from the USB port, but then how would you read the encrypted C: drive?

Again, I don't need the machine to boot into Windows. I don't even need Windows to be running. Everything happen at the BIOS and below. I just get complete access to Windows when it is running.

You read an encrypted hard drive the same way you do forensics on any hard drive. Make an image of the disk, take it offline and use one of the many cracking programs available on the hash file.

Alternatively, leave a hidden Administrator account, a keystroke logger and a backdoor. Wait until you log in again to record and recover the password.

Your faith in commercial encryption is touching but naive. Not that encrypting data at rest is a bad idea, but there is no silver bullet solution for computer and network security.

Properly securing a network takes a combination of people, processes, and technology. When you do it, the bottom line doesn't contain too many zeros for most organizations, but too many commas.

However, to a sophisticated enough threat, if you only partially pay the bill, it's as if your network is still wide open.

36 posted on 05/03/2008 8:23:12 PM PDT by Natty Bumppo@frontier.net ("The facts of life are conservative!" Margaret Thatcher)
[ Post Reply | Private Reply | To 24 | View Replies]

To: mad_as_he$$; Natty Bumppo@frontier.net

I’d be interested in both of your assessments of Truecrypt.


37 posted on 05/04/2008 5:49:27 AM PDT by TruthSetsUFree
[ Post Reply | Private Reply | To 25 | View Replies]

To: Doohickey
Poor writing skills aside, there is no back door here. It automates commands that would normally have to be entered by hand on a logged-in computer. I’ll grant there may be a rainbow brute force cracker, but those have been freely available for years now.

Much ado about nothing, but y’all can feel free to enjoy the knot in your panties.

Well, it's good to know that all passwords and everything else is wide open to anyone who logs into a Windows box, even without administrator privs. Kinda puts the "security" on said computers into perspective doesn't it?

38 posted on 05/04/2008 7:43:59 AM PDT by zeugma (Mark Steyn For Global Dictator!)
[ Post Reply | Private Reply | To 15 | View Replies]

To: Dawnsblood

It’s been obvious for a long time that nothing can stop the police from reading anything they please. Unless there is a real life Cryptonomicron store house somewhere.


39 posted on 05/04/2008 7:49:24 AM PDT by DManA
[ Post Reply | Private Reply | To 1 | View Replies]

To: S.O.L.
True Crypt is only as good as the lazy human who uses it. Enough time and computing power they all can be broken. If a human made it a human can undo it. Most humans a sloppy about keys and passwords.
40 posted on 05/04/2008 8:14:27 AM PDT by mad_as_he$$ (Sleep with one eye open, Gripping your pillow tight , Exit light , Enter night.......)
[ Post Reply | Private Reply | To 30 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-44 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson