Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Privacy Government Security IT News

UK Cops Want "Breathalyzers" For PCs 545

An anonymous reader writes "One of the UK's top cyber cops, detective superintendent Charlie McMurdie, says the top brass want to develop the equivalent of a breathalyzer for computers, a simple tool that could be plugged into a machine during a raid and retrieve evidence of illegal activity. McMurdie said the device was needed because of a record number of PCs were being seized by police and because the majority of cops don't have the skills to forensically analyse a computer."
This discussion has been archived. No new comments can be posted.

UK Cops Want "Breathalyzers" For PCs

Comments Filter:
  • by Joe The Dragon ( 967727 ) on Thursday December 11, 2008 @03:54PM (#26079751)

    So they want GOV spyware? They will still need people to look at the data.

    • by blueg3 ( 192743 ) on Thursday December 11, 2008 @03:55PM (#26079785)

      Good job managing to misread the summary.

      • by sexconker ( 1179573 ) on Thursday December 11, 2008 @04:46PM (#26080719)

        What?
        It's an apt post.
        Spyware snoops around and grabs whatever it finds and deems to be unbecoming of a law abiding computer user.

        They then hand that off (and the pc itself, likely) to a group of people who will do the analysis.

        The post above you implies that this tool will not be of much actual help, and I agree. A "clean" report from the tool means nothing, and for any actual raids the computers will still be combed over by a forensic team. Any "dirty" report from the tool will result in the same outcome.

        What this is really about is passing the buck and keeping face - the cops don't want to look incompetent, so they create this tool and publicize it.
        Any failure of the cops will be blamed on the tool still being a work in progress, hackers actively working against the tool, etc.
        Any responsibility on the part of the cops will be passed off immediately to the forensics teams. When the tool gives out a "dirty" report, the cops will fill out the green "Suspicion of Illegal Digital Bits on Electrical Personal Computing Device" form and hand over the report and the pc to the forensics team.

        Once the tool is accepted as good and trustworthy, departments will find any excuse at all to use them to harass and extort money from the public.

        Noise complaint?

        Let's bang on the doors, give them shit, and check their computers for illegal activity. You just KNOW that music isn't paid for.

        No, sir, since we heard music from the street, and we clearly can see you have a computer, and sound system, and a lack of physical CDs/tapes/records, in plain sight. We have reason to believe a crime has been committed. We don't need a warrant to perform a cursory search. If the search turns up anything, your equipment will be confiscated as evidence.

        • by Yetihehe ( 971185 ) on Thursday December 11, 2008 @05:36PM (#26081723)
          Actually, if you can hear music from the street, it can be called "unlicensed public performing/playing".
        • Re: (Score:3, Insightful)

          by blueg3 ( 192743 )

          Conducting a search due to a crime in progress or evidence in plain sight is significantly more difficult -- at least in the US -- than you make it out to be. Never mind that copyright infringement is, except in a few cases, a civil matter and not criminal (meaning the police cannot investigate it, and could not possibly claim there was open evidence of a crime).

          The problem with the original post is that it called the desired tool spyware. Spyware has a particular meaning: it is software that is installed s

          • by sexconker ( 1179573 ) on Thursday December 11, 2008 @06:56PM (#26083057)

            The cops can and will search and bust you with a reasonable suspicion / in plain sight excuse SO easily. Yes, in the USA.

            Do you really think that such a tool, if created, would not be spyware?

            Spyware has no particular meaning. Malware, Adware, Spyware, Greyware, Foistware, Crapware, Bloatware, etc. have all been coined in a feeble attempt to classify and categorize programs. There is no official designation or definition.

            The term is a merging of the word "spy" and the word "software". Literally, spyware is software that spies. What is spying? Spying is looking for and collecting information, often secretly.

            Do you honestly believe that, if such a tool were created, the police would have you a report of what information was obtained, and what information was looked for?
            Do you believe that there won't be cases where they use the tool on your computers and simply don't tell you?
            Do you believe that such a tool, if implemented, would respect your rights and remove all traces of itself from your machine?

            You jumped at the chance to shoot someone down and farm some karma by accusing them of not reading the summary.
            In doing so, you missed the point of the post entirely (that people will still need to look at the data).
            I called you out on it.
            You got pedantic, saying the problem with the original post was the use of the term "spyware".
            I'm calling you out again.

      • by syousef ( 465911 ) on Thursday December 11, 2008 @11:48PM (#26086177) Journal

        Good job managing to misread the summary.

        Yeah! I didn't read the article or the summary and I can tell you I have the following strong opinion: There's no need for breathalizers for computers because if I pour alochol onto my computer it would short out. Therefore to determine if a computer has had alcohol just try and switch it on. If the power comes on and it boots, it hasn't had anything to drink.

  • Right (Score:5, Insightful)

    by Endo13 ( 1000782 ) on Thursday December 11, 2008 @03:54PM (#26079753)

    That's pretty much like building a mind-reader to figure out if a person has ever committed a crime. Good luck with that.

    • Re:Right (Score:5, Insightful)

      by Anonymous Coward on Thursday December 11, 2008 @03:57PM (#26079819)
      Well, it's easy enough to build up a database of SHA1 hashes for kiddie porn and such. But what they describe is simply ludicrous:

      McMurdie said such a tool could run on suspects' machines, identify illegal activity - such as credit card fraud or selling stolen goods online - and retrieve relevant evidence.

      Hey asshole, aren't search warrants supposed to explicitly specify what you're looking for? You seized the computer, it should've been for a specific reason, not to conduct a fishing expedition.

      • Re:Right (Score:5, Interesting)

        by theaveng ( 1243528 ) on Thursday December 11, 2008 @04:03PM (#26079913)

        Well put.

        But the governments of this world routinely ignore law (obtain warrant naming specific evidence desired) and instead do exactly what you described - go on a fishing expedition. "Well we came here to get marijuana, but instead we discovered porn on your PC, so you go to jail buddy."

        They do this same ____ in the U.S. with random searches of cars. They are supposed to be looking for illegal immigrants, but instead they bring in the dogs and have them sniff for marijuana/cocaine. Then they arrest you.

        This shouldn't be allowed.

        • Re:Right (Score:5, Interesting)

          by CannonballHead ( 842625 ) on Thursday December 11, 2008 @04:14PM (#26080103)

          Doesn't this kinda depend? Just because you found something else while looking for your actual thought doesn't mean you have to IGNORE it. If you came looking for credit card fraud and found, say, illegal hacking activity, should they just ignore it? If you go into a house looking for marijuana and you find people being tortured, do you have to go back to the station, get a warrant for looking into that, and then come back?

          Now, if they pull you over for "presumably" running a stop sign and sniff your car, that's different. On the other hand, since illegal immigrants and drugs seem to go together, since drug trafficking and immigrant trafficking is a similar thing (smuggling), I don't actually see a problem is searching for both at the same time.

          I'm not saying they should be allowed to just randomly show up and search your house without giving a reason, by the way.

          It's a fine line between hampering catching criminals by giving "too many rights" and stepping over the bounds of innocent until proven guilty...

          • by khasim ( 1285 ) <brandioch.conner@gmail.com> on Thursday December 11, 2008 @04:32PM (#26080447)

            "Reasonable suspicion" is the key phrase here.

            If the cop stops you for running a red light and sees something suspicious then he can go further.

            But stopping you for one thing does NOT give them the authority to check for everything they can think.

            http://en.wikipedia.org/wiki/Reasonable_suspicion [wikipedia.org]

          • Re:Right (Score:5, Interesting)

            by Firehed ( 942385 ) on Thursday December 11, 2008 @04:40PM (#26080595) Homepage

            At least in the US, evidence found against you found in an illegal search* cannot be used against you. If the search was legal (warrant attained or reasonable suspicion of wrongdoing), then it's your fault for having done whatever other stuff you get hit with, regardless of why you/your home/vehicle was searched. Don't confuse this with secondary offenses, like not having your seat belt on in many states (they can't pull you over specifically for that, but can add it to the ticket).

            * if they can see the bag of weed (or whatever) on your back seat through the window, not only is it legal for them to arrest you for it, but it also gives them reasonable suspicion to search the rest of the vehicle without attaining a warrant, even if you protest.

            IANAL, YMMV, laws vary by state, etc. And all bets tend to be off at border stops, especially internationally. As far as I'm aware, they have the legal (USA PATRIOT act legal, anyways) right to search your vehicle entirely at any international border.

            But back to the topic at hand, if your computer is legitimately siezed, I think you should at least be able to know what processes were used to search for X when Y was found. If they want to arrest you for possession of goat porn, and then they find CP, you should be able to find out that the latter came up when they did a general search for porn, rather than when they explicitly searched for it. Or if they find pirated media when searching for CP, which would be a lot harder to accidentally find by the same 'legit' search. It'll never happen, and good luck auditing the police's methods even if you had the right to do so. Just encrypt all of your crap, and don't have illegal stuff.

            My 2c

            • Re: (Score:3, Insightful)

              by johnsonav ( 1098915 )

              Just encrypt all of your crap, and don't have illegal stuff.

              Amen. With all the practically unbreakable, freely available encryption solutions out there, I don't understand why any criminal who, even occasionally, touches a computer, doesn't use a generous amount of encryption. Encryption stymies any attempt at, after the fact, detection.

              Anyway, I guess nobody complains when the dumb criminals make it easy.

              • Re: (Score:3, Insightful)

                by Shakrai ( 717556 )

                I don't understand why any criminal who, even occasionally, touches a computer, doesn't use a generous amount of encryption. Encryption stymies any attempt at, after the fact, detection.

                Because most criminals are idiots to begin with. Seriously. Ask any cop how many criminals they've arrested whom would have gotten away with whatever crime they committed if they had kept their mouths shut. Combine that level of stupidity with the fact that the typical criminal isn't going to be very computer savvy and you can see why few of them use encryption.

                • Re:Right (Score:5, Funny)

                  by johnsonav ( 1098915 ) on Thursday December 11, 2008 @05:33PM (#26081651) Journal

                  Because most criminals are idiots to begin with.

                  Sigh... You're right. Which is probably why there are so few elaborate bank-jobs, cunning cons, and ridiculously over-the-top plots to blow up buses that fall below 55mph, in the news. I like movies better than real life. Sigh...

                  • Re:Right (Score:4, Interesting)

                    by Shakrai ( 717556 ) on Thursday December 11, 2008 @06:10PM (#26082329) Journal

                    Which is probably why there are so few elaborate bank-jobs

                    And I could actually understand the motivation for an elaborate bank-job. You disable the alarm, tunnel into the bank, break open the vault and walk away with a cool million or so. I could get behind that. A million bucks is worth the chance of going to prison......

                    What isn't worth the chance of going to prison is the dumbass who holds up the bank with a gun and walks away with a lousy $10,000. Even worse is the dumbass who holds up the gas station with a gun and walks away with less than $100. Clearly they didn't do a proper cost benefit analysis ;)

                    • Re:Right (Score:5, Interesting)

                      by LunaticTippy ( 872397 ) on Thursday December 11, 2008 @08:15PM (#26084241)
                      Yeah, the 7-11 bandits that get <$10 plus some beer and cigarettes crack me up. A lot of crime seems very inefficient. $200 for a new car window, $200 for a new stereo, $200 for the dashboard repairs, and the thief got $20.

                      I knew a bank robber. I didn't know he was knocking over banks at the time, but he later was in a long distance high speed chase ending in suicide by cop. Pretty surprising to everyone that knew him. I think he got ground down by his circumstances for too long. He spent so many years having to scrimp and do without it made him crazy. I remember him going out to eat a lot and buying little gifts for his friends and seeming happier than usual. I guess for him a lousy $60k (assuming he got $10k per bank) was worth dying for.

                      The truly weird thing was when he got away from the 5th bank it was very close. He was driving on medians and shoulders, through fields like a maniac during rush hour with dozens of cops on his tail. Somehow he got away and instead of ditching the car and going straight he laid low for a month and did it again.
              • Re:Right (Score:4, Insightful)

                by triffid_98 ( 899609 ) * on Thursday December 11, 2008 @06:53PM (#26083007)
                Which is exactly why we'll code our application to flag any encrypted files or hidden partitions, plus a full scan of your unencrypted swap file.

                Since this is the UK you will hand over your encryption keys [linuxworld.com.au], have a nice day.

                Just encrypt all of your crap, and don't have illegal stuff.

                Amen. With all the practically unbreakable, freely available encryption solutions out there, I don't understand why any criminal who, even occasionally, touches a computer, doesn't use a generous amount of encryption. Encryption stymies any attempt at, after the fact, detection.

            • Re: (Score:3, Informative)

              As far as I'm aware, they have the legal (USA PATRIOT act legal, anyways) right to search your vehicle entirely at any international border.

              No. The US Border agencies have had the authority to search you and your accompanying articles long long before the Patriot Act. You with mere suspicion, your articles with no suspicion. (They must still have probable cause to enact an arrest of you or seizure of your merchandise but may detain with reasonable suspicion.)

            • Re: (Score:3, Insightful)

              This is somewhat off-topic, being about American law, but the "probable cause" and "reasonable suspicion" laws are abused continually. Police can and do search wherever they feel like by lying and saying they "smelled something." Flex your rights. [flexyourrights.org]
          • Re: (Score:3, Insightful)

            by HTH NE1 ( 675604 )

            It's a fine line between hampering catching criminals by giving "too many rights" and stepping over the bounds of innocent until proven guilty...

            Oh yes, it's so fine a line that it is in fact the same line approached from opposite sides.

          • Re:Right (Score:4, Informative)

            by sexconker ( 1179573 ) on Thursday December 11, 2008 @04:51PM (#26080825)

            If you go into a house looking for marijuana and you find people being tortured, do you have to go back to the station, get a warrant for looking into that, and then come back?

            People being tortured? No, they stop it right then and there.
            Evidence of people being tortured? Yeah, you have to get another warrant.

          • Re:Right (Score:5, Informative)

            by bitslinger_42 ( 598584 ) on Thursday December 11, 2008 @04:51PM (#26080841)

            According to US law, at least (and not always followed by US cops, I might add), whether the evidence on the secondary offense is admissible or not depends on how it was found. If a cop pulls over a car for speeding and sees an open container of beer sitting on the seat next to the driver, the open container is typically admissible. If, on the other hand, the cops raid a house looking for a stolen 62" television and, as long as they're in the house, decide to check in the toilet tank and find a stash of cocaine, that typically is not, since searching the toilet wouldn't have been part of the search for the big TV. Likewise, the original warrant would probably not allow the cops to bring along drug-sniffing dogs on a search for a stolen TV. Of course, I'm generalizing here, and am not a lawyer, but you get the picture.

            Thus far, the same principles apply to computer searches. If the warrant says that the cops are looking for evidence related to illegal gambling operations on the computer, the cops are typically not allowed to search for non-related keywords (i.e. "lolita", "cocaine", etc.) unless such terms show up in documents found by the warranted search. If, in reviewing a document named IllegalGamblingProfits.doc, they see a reference to cocaine sales, the cops may have just cause to perform another search looking for cocaine. Since they've already got the computer at that point, though, they'd be better off to go back to the judge and get a 2nd warrant that authorizes the cocaine search, but given the similarities between finding the information in an admissible piece of evidence and seeing the open container in plain sight, I can see how a judge would give the benefit of the doubt in court.

            I can't quite tell what the cops in TFA are asking for, though. If, on the one side, they want to be able to bring along a device that's pre-configured with the search terms for the warrant (gambling terms, from the above example), such a device would theoretically be legal in the US, since it would simply be automating the search that would otherwise have been performed by the trained analyst. If, on the other side, they want a device that identifies any illegal activity, that should be unconstitutional for 4th Amendment reasons.

            All of the legal discussion ignores the technical aspects. I am a professional forensic analyst, and with relatively good hardware (dual 64-bit CPUs, 10k RPM SATA drives, 4GB of RAM, etc.) it can take hours to perform even a simple search with a small list (i.e. fewer than 5) of static (i.e. non-regex) keywords. Adding complexity in, or adding keywords, can increase the search time to days. There's no way that untrained cops could simply plug a device into a suspect's 5 year old laptop and be able to get results back in less than an hour, and that's not counting the potential modifications to the evidence caused by booting without a write-blocker, doing deleted-file recovery, opening compound files (Outlook offline storage, ZIP files, etc.) or doing signature analysis to identify obfuscated data. Don't even think about it if the suspect thought enough to use encryption [truecrypt.org].

            The cops may want something like this, but it will probably be the laws of physics that prevent it and not the Constitution.

            • Umm, not quite (Score:4, Informative)

              by logicnazi ( 169418 ) <gerdesNO@SPAMinvariant.org> on Thursday December 11, 2008 @05:58PM (#26082121) Homepage

              Yes, generally anything that is encountered during the course of a lawful search (even if for something else) is admissable. Sure, cops can't go paw the drawer next to your bed looking for a stolen TV but the problem is how this is understood by the courts.

              In particular this rule is understood to mean that if the police open your safe looking for a stolen laptop the papers inside would be admissible in court. In other words once the police have cause to look inside a container you own they can examine the contents at their leisure, they need not immediately cease looking the second it's apparent the subject of their warrant isn't present. Now if you had a locked jewelery box inside that safe they likely wouldn't be able to examine the contents if it was outside the scope of the original warrant but the problem is when you try to map this notion onto that of a computer.

              In particular it turns out that case law so far has endorsed the idea that the computer is just one big container. Maybe things would be different if you had an encrypted volume on the computer but in general once they have reason to examine your computer for one thing they can examine everything.

              In fact the standard practice in the US is to seize your computer and have their experts perform a low level clone of the disk the second they have any reason to search your computer. Moreover, since the 4th ammendment and past case law is grounded in the notions of physical searches and seizures there is no framework for restricting what they can use the HD clone for once it's been made (well privacy laws might prevent them from disclosing your cybersex logs but that's about it)

            • Re:Right (Score:4, Funny)

              by clarkn0va ( 807617 ) <apt,get&gmail,com> on Thursday December 11, 2008 @06:20PM (#26082479) Homepage

              and with relatively good hardware (dual 64-bit CPUs, 10k RPM SATA drives, 4GB of RAM, etc.) it can take hours to perform even a simple search with a small list

              I believe that's why Vista introduced Instant Search [microsoft.com]. Johnny Law just needs to call ahead and ask the suspect to ensure that it's enabled and properly configured. And that the suspect has at least 4GB of RAM installed, and dual 64-bit CPUs. Also, it would be helpful if the suspect left the computer on so the police don't have to wait around for Vista and Norton and HP to spin up. Hmm. I'm starting to see your point.

          • Re: (Score:3, Insightful)

            by Hurricane78 ( 562437 )

            The point is, that the original suspicion - the one they got the warrant for - is completely made up and fake. Our whole law system is set up in a way, that there always is something you did "wrong". Always. That's the basic idea of laws nowadays.

            So the trick is, that they can put anyone to jail if he does not fit their agenda.

            It's like a mafia you can bribe. They will go, make up some "suspicion", search your house, find some obscure thing that's in law book 5000, paragraph 9574 section v, subsection 385,

          • Re: (Score:3, Interesting)

            Doesn't this kinda depend?

            Kinda. But when in actual practice, things are routinely done such as pulling over cars going through sections of state and national forests by game wardens so that the local K9 unit can sniff the car for drugs you have to take notice. Why game wardens? Because they have broad powers to search a vehicle on any park land, even through roads, looking for game poaching. This is being used TODAY all the time to pull "suspicious looking" people over, search their cars, and end up making a drug or DUI arrest.

          • Sadly, yes (Score:4, Insightful)

            by RexDevious ( 321791 ) on Thursday December 11, 2008 @08:24PM (#26084377) Homepage Journal

            A lot of "common sense" powers have had to be denied to police, because they've proven themselves incapable of not abusing them. Every counter-intuitive restriction placed on government officials can be traced to an incident of abuse so horrific, that society opted to "tie the hands" of everyone rather than entrust anyone with that power any longer. Really, it takes quite a lot for anyone in government to advocate a limit on governmental powers.

      • Re: (Score:3, Funny)

        by Endo13 ( 1000782 )

        Hey asshole, aren't search warrants supposed to explicitly specify what you're looking for? You seized the computer, it should've been for a specific reason, not to conduct a fishing expedition.

        Duh! They're looking for Illegal Activity, which is the specific reason they seized the computer!

      • Re: (Score:3, Interesting)

        by thesqlizer ( 919307 )
        I don't recall where (or if) the US Supreme Court handed down a decision on the concept of "Are computer files more like what's in your brain or in a file cabinet."

        IMHO, searching a computer is akin to searching someone during questioning.

        Questioning someone who has been Mirandized: fine.
        Going through their belongings with a search warrant to find something specific: fine.
        Going through a computer willy-nilly on a fishing expedition: not fine.
      • Re:Right (Score:5, Informative)

        by blueg3 ( 192743 ) on Thursday December 11, 2008 @04:15PM (#26080131)

        Actually, that's not the problem they're trying to solve. I don't know about in the UK, but in the US, any kind of searching (including hash comparisons and automated tools like this) require a search warrant that covers the computer.

        What they're really interested in is not conducting fishing expeditions, but trying to find some useful information -- even just narrowing down which machine they actually need to fully analyze -- within the machines covered by a search warrant. Generally the procedure is to box these things up, hand them over to computer forensic experts, and wait 6-12 months for them to perform a full analysis. Cutting down the amount of work they have to do by giving them only the one computer out of ten that is actually interesting, or being able to pull some small amount of useful information to use in the investigation immediately, is of great value.

        This is at least a big concern in the US -- computer forensic investigations are slow and costly, and there's a huge backlog.

        Not that I think they'll be able to make software that magically tells them if a computer was involved in illegal activity -- but the majority of computer criminals are dumb as bricks and could probably be caught by doing a full-disk grep for files containing more than a couple of strings that look like credit card numbers.

    • Re: (Score:3, Insightful)

      That's pretty much like building a mind-reader to figure out if a person has ever committed a crime. Good luck with that.

      Or like exploiting three people capable of seeing into the future [imdb.com] in order to generate police reports and make arrests.

      As we learned, nothing can possibly go wrong!

    • Re:Right (Score:4, Insightful)

      by iamhassi ( 659463 ) on Thursday December 11, 2008 @07:00PM (#26083123) Journal
      "That's pretty much like building a mind-reader to figure out if a person has ever committed a crime. Good luck with that."

      Yeah, or they want remote access:
      "McMurdie also discussed the possibility of setting up a "central forensic server", where digital forensic experts from across the UK could log in and analyse whatever systems were plugged into it."

      Wow, are police in the UK really that dumb? They either want a magic wand that tells you if a computer has "illegal" content on it, or they want what has already existed since before the internet?
  • But... (Score:3, Funny)

    by Jonah Bomber ( 535788 ) on Thursday December 11, 2008 @03:55PM (#26079769)
    Won't that only work with alcohol cooled systems?
    • Re:But... (Score:5, Funny)

      by Chris Burke ( 6130 ) on Thursday December 11, 2008 @04:02PM (#26079903) Homepage

      Won't that only work with alcohol cooled systems?

      Yeah, but unless the alcohol cooled computer is driving a car, I don't see how that's illegal.

      But seriously, people, don't let your PC drive under the influence. Yeah, yeah, it says that it's "overclocked' and much more efficient than when it's just running on water, but then it'll kill a little old C64 crossing the street and wind up in "Pound Me In the USB Port" Prison.

    • Re: (Score:3, Funny)

      by hansamurai ( 907719 )

      I once had a bourbon cooled CPU. Then it overheated, because I drank it all.

  • by Foofoobar ( 318279 ) on Thursday December 11, 2008 @03:57PM (#26079813)
    Steganography, encryption, log erasing, etc. There is no 'out of the box' solution. Every computer is going to require a computer forensics team to go over it unless the OS manufacturer builds in those tools. And you can guarantee that NO manufacturer wants people to know that anyone can just open up your system via a backdoor at anytime.
  • by konigstein ( 966024 ) on Thursday December 11, 2008 @03:57PM (#26079817) Homepage
    Because it's painfully clear your don't understand computer forensics either.
    • by jimicus ( 737525 ) on Thursday December 11, 2008 @04:31PM (#26080423)

      Her day job is architect of the UK's Police Central E-crime Unit, so it might be a bit late for that.

      Having said that, I get the distinct impression from RTFA that this is pie-in-the-sky "this is the sort of tool we'd like in an ideal world, not that it's even remotely practical" rather than something that's in active development:

      said frontline police ideally need a digital forensic tool as easy to use as the breathalyser, to help them deal with growing numbers of computers being seized during raids on suspects' homes

      Yep, and I bet they'd like a machine which they can just turn on, punch in details of an unsolved crime and bingo! it tells you the perpetrators name, address, telephone number, the car they drive, their plans for the next 48 hours and where sufficient evidence to obtain a conviction can be found. It's fairly obvious from the article that whatever qualification this woman has, none of them involve technology.

  • Outlaw encryption (Score:4, Insightful)

    by TheMeuge ( 645043 ) on Thursday December 11, 2008 @03:57PM (#26079821)

    The next inevitable step for the UK gov't will be to outlaw using encryption on personal computers, because it's "too hard" to break.

    This isn't a slippery slope for the UK anymore, it's a landslide, rushing down the mountain, annihilating everything in its way.

    Sad.

    • by rlp ( 11898 ) on Thursday December 11, 2008 @04:00PM (#26079875)

      Too late - in Britain, it is a crime to refuse to turn-over your encryption key to the police when requested (no 5th amendment rights).

      • Re:Outlaw encryption (Score:5, Interesting)

        by orzetto ( 545509 ) on Thursday December 11, 2008 @04:07PM (#26079983)
        What happens if you "forget" the key? Like this: "Your honour, I once experimented with encryption, but could not understand how it worked. The files must be leftovers of that installation. I never used them and they must be empty." How can they prove you are lying, short of breaking the encryption and finding the evidence?
        • Re: (Score:3, Informative)

          by mdm-adph ( 1030332 )

          That's when the "rubber-hose" encryption-breaking procedures start.

          (England prevails.)

        • "Your honour, I once experimented with encryption, but could not understand how it worked. The files must be leftovers of that installation. I never used them and they must be empty."

          Okay, Sir. We'll just help you out by deleting all those pesky empty files and perform a wipe of your free space afterwards. This will recover all that space that you assure us has nothing of value in it. And then we'll check up on you every week or three just to ensure, mind you, that you don't have any of that pesky encry

        • Re: (Score:3, Informative)

          Doesn't matter. Not providing the key is an offense, regardless of reason. You go to jail.
  • Yeah, right... (Score:5, Insightful)

    by Drakkenmensch ( 1255800 ) on Thursday December 11, 2008 @03:59PM (#26079845)
    Combine this with a remote access software, and you don't even need to enter a person's home to scan their PC for files anymore. Forget all this pesky due process for warrants and investigation, we can now scan tens of thousands of computers every day and just fish idly for perps. All done without even needing to look at your screen while the software does the dirty work for you.
  • by Anonymous Coward on Thursday December 11, 2008 @03:59PM (#26079853)
    1) Hide a remotely detonatable explosive device in your computer
    2) Write a script to automatically crawl 4chan's /b/
    3) Be somewhere else when the party van arrives
    4) KABOOM!
    5) Nelson from the Simpsons would then usually say "ha-ha!" but he's locked up on child porn charges because he posted his own nudes on the internet.
  • by Mr. Slippery ( 47854 ) <tms&infamous,net> on Thursday December 11, 2008 @04:02PM (#26079897) Homepage

    Charlie McMurdie, says the top brass want to develop the equivalent of a breathalyzer for computers

    Top brass also wants a date with Scarlett Johansson. And a pony for each officer on the force.

    I figure the odds are about the same for each.

  • I can see (Score:4, Interesting)

    by zehaeva ( 1136559 ) <zehaeva+slashdot AT gmail DOT com> on Thursday December 11, 2008 @04:03PM (#26079921)
    There is going to be a large amount of demand for "Computer Forensics Specialist" in the near future. Too bad the majority of them are going to go to devry thinking they're going to learn everything they need to.
  • by orzetto ( 545509 ) on Thursday December 11, 2008 @04:03PM (#26079923)

    What next, a breathalyser for paedophiles? Murderers? Terrorists? Why does not the UK police use that money to train their people or hire new specialists instead of trying to build a perpetuum mobile? Any criminal worth spending this project's money on is savvy enough to fully encrypt his hard disk. If they are so dumb not to encrypt compromising data, any cop with a few hours of training could find it. So what is this project really aiming at?

    • Re: (Score:3, Insightful)

      by Qzukk ( 229616 )

      Why does not the UK police use that money to train their people or hire new specialists instead of trying to build a perpetuum mobile?

      Because the "top brass"'s nephew only sells USB trinkets, not training for specialists.

    • Re: (Score:3, Insightful)

      by kabocox ( 199019 )

      So what is this project really aiming at?

      Do you really want to know? Think about what breathalyzers do. They are used by the cops to get a number off you. That number has been used by law makers and such that anything above a number is instant DWI, anything between some numbers is up to the cop, and anything below a certain number the cops just let you go because they know that they it's too low to make get through a court.

      That's what this person wants. A black box that any idiot cop can use on a computer a

  • Interpretation (Score:4, Interesting)

    by Capt James McCarthy ( 860294 ) on Thursday December 11, 2008 @04:07PM (#26079985) Journal

    It costs too much money for the Police to pay quality IT Forensics folks. The police want a simple green, yellow, or red light that the police can follow, that is closed source and has it's AI written by policy makers to decide what is legal or questionable.

  • The Truth (Score:5, Insightful)

    by JackassJedi ( 1263412 ) on Thursday December 11, 2008 @04:09PM (#26080011)
    The scary thing about this is that it doesn't matter if it works right, it just matters if it gets certified and approved for use as that what it claims it is. And that could just happen.
  • by causality ( 777677 ) on Thursday December 11, 2008 @04:13PM (#26080081)
    I really think this is the same mentality that eventually comes to see individual rights and due process as pesky "inefficiencies" that only interfere with "real police work". They seriously need to tell new police recruits that their job is not easy and is not supposed to be easy. If any of them don't like that they should also be told where the exits are.

    I think this is another example of relatively well-meaning people who fail to comprehend how dangerous their intentions are because they don't think them through. Let's say there is a device that can be plugged into a PC (maybe the USB port?) and almost instantly tell you whether it has illegal content with no need for expert analysis. Yeah I know that I should also posit the existence of the tooth fairy but bear with me. Who makes this device? How trustworthy are they? Do competitors or other rivals oddly happen to have a higher percentage of "illegal" PCs? Is the device a black box or can the average person examine and scrutinize it? If the cops already don't have the staff or the expertise to perform forensic analysis on PCs, what's our guarantee that they will correctly use this device or that they can offer any sort of assurance that the way it is used won't violate anyone's civil rights? What's to prevent criminals from obtaining one (by whatever means) and making sure that their illegal data isn't where this thing is looking? If I can think of this in a few minutes, WTF are these people smoking that they consider this a serious proposal? Or do they simply not care about these concerns?

    You know what you'll probably never see? The police "top brass" asking for a device to help make sure that their officers don't violate anyone's civil rights and that they follow all the laws concerning due process.
  • by jollyreaper ( 513215 ) on Thursday December 11, 2008 @04:14PM (#26080087)

    I'll just use a hot glue gun to seal up all of my usb ports and use ps/2 connectors for mouse and keyboard.

    fuzz: HOLY SHIT! THIS GUY MUST BE SOME SORT OF UBER_HACKER!!!

    me: Too fucking right. Now you piggies hurry on back to the donut shop or I'll make your cruiser drive you down to the gay district on autopilot with YMCA blaring from the radio. (holds hands up over head, makes "whoooooooooing" scary sound, wiggles fingers menacingly)

    fuzz: BETTER TAKE HIM SERIOUSLY! HE COULD DO IT!!

    me: Heh. Wankers.

  • The Headline (Score:4, Insightful)

    by UMNbandgeek ( 952506 ) on Thursday December 11, 2008 @04:15PM (#26080113)
    When I read the headline, I thought they literally meant a breathalyzer, to keep drunk people off PCs. I could probably use one, it would cut down on the drunk IMs and facebook posts.
  • *hic* (Score:3, Funny)

    by snarfies ( 115214 ) on Thursday December 11, 2008 @04:15PM (#26080129) Homepage

    well i *hic* thinkj tihs is a stipid idea, *hic* and sos ur mothar!1

  • by blophyus ( 1166871 ) on Thursday December 11, 2008 @04:20PM (#26080237)

    Forget a tool for computers. We need a tool like this for physical crime scenes. You know: something that would, like, scan crime scenes and find, like, relevant DNA evidence and shit. It could even have an option where it would print out an arrest warrant with the name of the murderer on it.

  • by gweihir ( 88907 ) on Thursday December 11, 2008 @04:24PM (#26080293)

    Seriously, wanting something does not make it appear or even possible to exist. Most people have learned that by age 5. My take is that today it is not even possible to determine what illegal contents is automatically, regardless of what amount of ressources you throw at it. I belive that the AI problem would need to be solved first, and that has been eluding humanity for several decades now, to the point that it is still unclear today whether it will be solved ever.

    The solution is of course simple: Decide how important this really is, and then throw the appropriate amount of money at hiring experts. Chances are this turns out to be basically a non-issue. The hard stuff (children harmed in production) is identifiable for cops as well. The soft stuff (music, films, games) is not relevant to continued prosperity of the human race and only gets this much attention because some people turned it into a goldmine. It does not have to be at all. I would expect that broadband Internet and large HDDs make significantly more profit than Hollywood and the music industry combined. And the artists? I do not see any problem there either. Go to a donation-model and the ones that are creative and good will still live well. The others are not of any importance anyways.

    • Seriously, wanting something does not make it appear or even possible to exist. Most people have learned that by age 5.

      The rest go into software project management.

  • Analyse? (Score:4, Funny)

    by zmooc ( 33175 ) <{ten.coomz} {ta} {coomz}> on Thursday December 11, 2008 @04:36PM (#26080515) Homepage

    the majority of cops don't have the skills to forensically analyse a computer

    The majority of cops doesn't even have the skills to find my computer halfway up the old chimney;P However, I'm looking forward to the day they have to work their way through my massive computer-cemetery;->

  • by PMuse ( 320639 ) on Thursday December 11, 2008 @04:46PM (#26080713)

    As other posters have noted, cyber fraud is hard to prove, since the evidence it leaves behind (data, transactions, account numbers) looks so much like legal commerce. It takes a lot of smart work by educated professionals to prove the difference.

    Now you know one of the reasons that the police like drug laws so much: The key facts can be understood and collected by an officer with an IQ of 80 and just a couple months of training.

  • by roc97007 ( 608802 ) on Thursday December 11, 2008 @05:19PM (#26081383) Journal

    The first thing that occurs to me is that any appliance easy enough for a beat cop to use couldn't be very high-grade forensics. If there is a standard set of techniques used by the appliance, there will almost immediately (as soon as one is stolen) be a standard set of work-arounds. After which, only the profoundly stupid and/or set-up will ever be caught.

    On the other hand, it occurs to me that the authorities only need the occasional high-profile arrest to keep funding going, so maybe it's a win-win for all -- the gov'ment gets credit for "cracking down on porn" and the hard cores have a known set of procedures to keep their stuff under cover.

  • by Chris Tucker ( 302549 ) on Thursday December 11, 2008 @06:08PM (#26082295) Homepage

    And you're ALL Number 6.

    Do you have the courage that Number 6 had? Will you fight back against Number 2?

    Are you just "A number" or are you Free Men & Women?

    The choice is yours.

On the eighth day, God created FORTRAN.

Working...