<article>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#article09_06_03_1951209</id>
	<title>UK Police Want Plug-In Computer Crime Detectors</title>
	<author>timothy</author>
	<datestamp>1244017200000</datestamp>
	<htmltext>An anonymous reader writes <i>"UK police are talking to private companies about using plug-in USB devices that <a href="http://www.silicon.com/publicsector/0,3800010403,39420144,00.htm">can scour the hard drive of any device they are attached to</a>, searching for evidence of illegal activity. The UK's Association of Chief Police Officers is considering using commercial devices that can perform targeted searches of text, pictures and computer code on hard drives, allowing untrained cops to detect anything from correspondence on stolen goods to child pornography. Police in the UK are desperate for a way of slashing the backlog of machines seized by the police in raids, with many forces having a backlog that will take a year to process."</i> Maybe they shouldn't seize so many computers.</htmltext>
<tokenext>An anonymous reader writes " UK police are talking to private companies about using plug-in USB devices that can scour the hard drive of any device they are attached to , searching for evidence of illegal activity .
The UK 's Association of Chief Police Officers is considering using commercial devices that can perform targeted searches of text , pictures and computer code on hard drives , allowing untrained cops to detect anything from correspondence on stolen goods to child pornography .
Police in the UK are desperate for a way of slashing the backlog of machines seized by the police in raids , with many forces having a backlog that will take a year to process .
" Maybe they should n't seize so many computers .</tokentext>
<sentencetext>An anonymous reader writes "UK police are talking to private companies about using plug-in USB devices that can scour the hard drive of any device they are attached to, searching for evidence of illegal activity.
The UK's Association of Chief Police Officers is considering using commercial devices that can perform targeted searches of text, pictures and computer code on hard drives, allowing untrained cops to detect anything from correspondence on stolen goods to child pornography.
Police in the UK are desperate for a way of slashing the backlog of machines seized by the police in raids, with many forces having a backlog that will take a year to process.
" Maybe they shouldn't seize so many computers.</sentencetext>
</article>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204857</id>
	<title>Re:How desperate are they?</title>
	<author>Anonymous</author>
	<datestamp>1244041380000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Training?  Education?  Not seizing so many computers???  That's just crazy talk.<br>They've been told they need to do something.  Creating an automagically usb wand to (allegedly) do what some might argue is their job is "something".  Therefore they must do it.<br>QED.  None of that pesky "thinking" required.</p></htmltext>
<tokenext>Training ?
Education ? Not seizing so many computers ? ? ?
That 's just crazy talk.They 've been told they need to do something .
Creating an automagically usb wand to ( allegedly ) do what some might argue is their job is " something " .
Therefore they must do it.QED .
None of that pesky " thinking " required .</tokentext>
<sentencetext>Training?
Education?  Not seizing so many computers???
That's just crazy talk.They've been told they need to do something.
Creating an automagically usb wand to (allegedly) do what some might argue is their job is "something".
Therefore they must do it.QED.
None of that pesky "thinking" required.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200885</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200975</id>
	<title>Re:Great...</title>
	<author>Anonymous</author>
	<datestamp>1244022540000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext>And for those of us with 10's of thousands of documents on our computers?  How well are these going to be able to differentiate between a PDF file that involves fiction and one that is real?  Hell, some of my source material for a horror screenplay I tinker with now and then has made-up schematics and lists of where and how people are going to be killed in the scenes.</htmltext>
<tokenext>And for those of us with 10 's of thousands of documents on our computers ?
How well are these going to be able to differentiate between a PDF file that involves fiction and one that is real ?
Hell , some of my source material for a horror screenplay I tinker with now and then has made-up schematics and lists of where and how people are going to be killed in the scenes .</tokentext>
<sentencetext>And for those of us with 10's of thousands of documents on our computers?
How well are these going to be able to differentiate between a PDF file that involves fiction and one that is real?
Hell, some of my source material for a horror screenplay I tinker with now and then has made-up schematics and lists of where and how people are going to be killed in the scenes.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206265</id>
	<title>good luck with that</title>
	<author>Anonymous</author>
	<datestamp>1244058720000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>With EU human rights laws and my rights not to incriminate myself and the fact my HD is sector encrypted.<nobr> <wbr></nobr>:)</p></htmltext>
<tokenext>With EU human rights laws and my rights not to incriminate myself and the fact my HD is sector encrypted .
: )</tokentext>
<sentencetext>With EU human rights laws and my rights not to incriminate myself and the fact my HD is sector encrypted.
:)</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207069</id>
	<title>Unless</title>
	<author>cyclomedia</author>
	<datestamp>1244112780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>How about we get around to changing that to "Innocent UNLESS proven guilty"...</htmltext>
<tokenext>How about we get around to changing that to " Innocent UNLESS proven guilty " .. .</tokentext>
<sentencetext>How about we get around to changing that to "Innocent UNLESS proven guilty"...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200717</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200985</id>
	<title>Re:Great...</title>
	<author>ve3id</author>
	<datestamp>1244022600000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>5</modscore>
	<htmltext>One principle of computer forensics is that if a computer is manipulated in any way, the evidence may be corrupted by such operation, and this could be used by defence attornies.  Real computer forensics involves getting the computer powered down, removing the disk, setting it up in a test jig with write protect enabled, and reading the complete image from the disk onto a sterile environment for analysis.

I don't think Mr. Plod will meet the test of admissibility into evidence!  How is he going to prove to the court that the suspected data were not on the USB key to start with?  If he has interfered with the computer in any way by plugging in a USB key, then the evidence is contaminated.</htmltext>
<tokenext>One principle of computer forensics is that if a computer is manipulated in any way , the evidence may be corrupted by such operation , and this could be used by defence attornies .
Real computer forensics involves getting the computer powered down , removing the disk , setting it up in a test jig with write protect enabled , and reading the complete image from the disk onto a sterile environment for analysis .
I do n't think Mr. Plod will meet the test of admissibility into evidence !
How is he going to prove to the court that the suspected data were not on the USB key to start with ?
If he has interfered with the computer in any way by plugging in a USB key , then the evidence is contaminated .</tokentext>
<sentencetext>One principle of computer forensics is that if a computer is manipulated in any way, the evidence may be corrupted by such operation, and this could be used by defence attornies.
Real computer forensics involves getting the computer powered down, removing the disk, setting it up in a test jig with write protect enabled, and reading the complete image from the disk onto a sterile environment for analysis.
I don't think Mr. Plod will meet the test of admissibility into evidence!
How is he going to prove to the court that the suspected data were not on the USB key to start with?
If he has interfered with the computer in any way by plugging in a USB key, then the evidence is contaminated.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202485</id>
	<title>Re:Hmm</title>
	<author>Anonymous</author>
	<datestamp>1244027760000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext><p>They probably wouldn't have a backlog of computers if they only confiscated computers where it might give be important evidence instead of using as away to punish people without the bother of a court case or even charging them. If they take your computer expect a long wait for your its return. If it does come back don't expect it to work.</p></htmltext>
<tokenext>They probably would n't have a backlog of computers if they only confiscated computers where it might give be important evidence instead of using as away to punish people without the bother of a court case or even charging them .
If they take your computer expect a long wait for your its return .
If it does come back do n't expect it to work .</tokentext>
<sentencetext>They probably wouldn't have a backlog of computers if they only confiscated computers where it might give be important evidence instead of using as away to punish people without the bother of a court case or even charging them.
If they take your computer expect a long wait for your its return.
If it does come back don't expect it to work.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200607</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28208891</id>
	<title>Re:First among other things...</title>
	<author>csartanis</author>
	<datestamp>1244127420000</datestamp>
	<modclass>Troll</modclass>
	<modscore>0</modscore>
	<htmltext><p>Except that they'd want it to automatically send a notification to the local enforcement agency if you're not in compliance.</p></htmltext>
<tokenext>Except that they 'd want it to automatically send a notification to the local enforcement agency if you 're not in compliance .</tokentext>
<sentencetext>Except that they'd want it to automatically send a notification to the local enforcement agency if you're not in compliance.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200507</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201287</id>
	<title>Re:I can provide what they need!</title>
	<author>blueg3</author>
	<datestamp>1244023680000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>They're probably not interested in the difficult (or impossible) problem of a comptuer criminal that's actually competent. If their computer forensic teams are anything like ours are in the U.S., they're spending a week or two per computer doing legally-sound forensic analysis of the computers of people who are morons and store their 10,000-image collection of child pornography in a directory on their desktop called "Kiddie Porn". It would be quite useful for them if there was something that would quickly produce a reasonably reliable "definitely bad stuff here", "possibly no bad stuff here", and "this one requires further investigation". (As many of the convenient encryption and some convenient steganography systems are reasonably detectable, having a "strange things were detected" choice is helpful.)</p></htmltext>
<tokenext>They 're probably not interested in the difficult ( or impossible ) problem of a comptuer criminal that 's actually competent .
If their computer forensic teams are anything like ours are in the U.S. , they 're spending a week or two per computer doing legally-sound forensic analysis of the computers of people who are morons and store their 10,000-image collection of child pornography in a directory on their desktop called " Kiddie Porn " .
It would be quite useful for them if there was something that would quickly produce a reasonably reliable " definitely bad stuff here " , " possibly no bad stuff here " , and " this one requires further investigation " .
( As many of the convenient encryption and some convenient steganography systems are reasonably detectable , having a " strange things were detected " choice is helpful .
)</tokentext>
<sentencetext>They're probably not interested in the difficult (or impossible) problem of a comptuer criminal that's actually competent.
If their computer forensic teams are anything like ours are in the U.S., they're spending a week or two per computer doing legally-sound forensic analysis of the computers of people who are morons and store their 10,000-image collection of child pornography in a directory on their desktop called "Kiddie Porn".
It would be quite useful for them if there was something that would quickly produce a reasonably reliable "definitely bad stuff here", "possibly no bad stuff here", and "this one requires further investigation".
(As many of the convenient encryption and some convenient steganography systems are reasonably detectable, having a "strange things were detected" choice is helpful.
)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200913</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201671</id>
	<title>Re:Open Source?</title>
	<author>fluch</author>
	<datestamp>1244025000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>The device is a black box. How will you be able to check if the particular device the police officer plugged in does indeed contain the software he claims to be on? Couldn't the device have some software on it which alters the system and places wrong evidence on the machine? And even if you want to check the device of the police officer later, how can you be sure it is the same device as he plugged in? Such a silly idea!</p></htmltext>
<tokenext>The device is a black box .
How will you be able to check if the particular device the police officer plugged in does indeed contain the software he claims to be on ?
Could n't the device have some software on it which alters the system and places wrong evidence on the machine ?
And even if you want to check the device of the police officer later , how can you be sure it is the same device as he plugged in ?
Such a silly idea !</tokentext>
<sentencetext>The device is a black box.
How will you be able to check if the particular device the police officer plugged in does indeed contain the software he claims to be on?
Couldn't the device have some software on it which alters the system and places wrong evidence on the machine?
And even if you want to check the device of the police officer later, how can you be sure it is the same device as he plugged in?
Such a silly idea!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200681</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201039</id>
	<title>This is a good idea</title>
	<author>delta98</author>
	<datestamp>1244022780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>and it will work as long as there is something of interest on sais\d target. By interest I mean corporate secrets  from a competing company that happens to fund the election bankroll of a  politician. Smoke and mirrors nothing more nothing less.</htmltext>
<tokenext>and it will work as long as there is something of interest on sais \ d target .
By interest I mean corporate secrets from a competing company that happens to fund the election bankroll of a politician .
Smoke and mirrors nothing more nothing less .</tokentext>
<sentencetext>and it will work as long as there is something of interest on sais\d target.
By interest I mean corporate secrets  from a competing company that happens to fund the election bankroll of a  politician.
Smoke and mirrors nothing more nothing less.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200623</id>
	<title>and the companion product....</title>
	<author>SethJohnson</author>
	<datestamp>1244021280000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>5</modscore>
	<htmltext>Anybody want to sponsor a contest to see who can write a USB driver that defeats this within the fewest lines of code?<br> <br>Seth</htmltext>
<tokenext>Anybody want to sponsor a contest to see who can write a USB driver that defeats this within the fewest lines of code ?
Seth</tokentext>
<sentencetext>Anybody want to sponsor a contest to see who can write a USB driver that defeats this within the fewest lines of code?
Seth</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204115</id>
	<title>All time best geek sig!</title>
	<author>condition-label-red</author>
	<datestamp>1244035620000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>Someone's going to be <a href="http://www.galleries.com/minerals/silicate/cummingt/cummingt.htm" title="galleries.com" rel="nofollow">(Mg,Fe)7Si8O22(OH)2</a> [galleries.com]</p></div> </blockquote><p>All time best geek sig!</p></div>
	</htmltext>
<tokenext>Someone 's going to be ( Mg,Fe ) 7Si8O22 ( OH ) 2 [ galleries.com ] All time best geek sig !</tokentext>
<sentencetext>Someone's going to be (Mg,Fe)7Si8O22(OH)2 [galleries.com] All time best geek sig!
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200813</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206463</id>
	<title>Re:Should be easy in the UK.</title>
	<author>mpcooke3</author>
	<datestamp>1244147820000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I'm not sure you understand how things work over here in the UK.</p><p>If people start using TrueCrypt volumes they'll change the law to assume everyone has a Truecrypt volume and if you can't give them access to it they'll throw you in prison to join the murderers, paedophiles and the people who forgot their winzip decryption password.</p></htmltext>
<tokenext>I 'm not sure you understand how things work over here in the UK.If people start using TrueCrypt volumes they 'll change the law to assume everyone has a Truecrypt volume and if you ca n't give them access to it they 'll throw you in prison to join the murderers , paedophiles and the people who forgot their winzip decryption password .</tokentext>
<sentencetext>I'm not sure you understand how things work over here in the UK.If people start using TrueCrypt volumes they'll change the law to assume everyone has a Truecrypt volume and if you can't give them access to it they'll throw you in prison to join the murderers, paedophiles and the people who forgot their winzip decryption password.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28213909</id>
	<title>Re:USB?</title>
	<author>nasor</author>
	<datestamp>1244148000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Or more usefully, have it just shunt the device to some generic little partition that it can look at and decide everything's legal.</htmltext>
<tokenext>Or more usefully , have it just shunt the device to some generic little partition that it can look at and decide everything 's legal .</tokentext>
<sentencetext>Or more usefully, have it just shunt the device to some generic little partition that it can look at and decide everything's legal.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28210869</id>
	<title>I'll sell them a system right now for 10\% off</title>
	<author>gearloos</author>
	<datestamp>1244135400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I have this "top secret" system I developed that is production ready and I'm willing to let it go for 10\% cheaper. It will also boot from a cd and then run a file from usb (or wherever you want to run it from)and they can enter any crime terms they want to find "hidden" things in text files etc....Whats this awesome system you ask? It's a Linux Live CD and a copy of grep or egrep and ls...What a revelation. Why don't they just have an actual CS guy on the payroll that knows what he is doing. Might save millions.</htmltext>
<tokenext>I have this " top secret " system I developed that is production ready and I 'm willing to let it go for 10 \ % cheaper .
It will also boot from a cd and then run a file from usb ( or wherever you want to run it from ) and they can enter any crime terms they want to find " hidden " things in text files etc....Whats this awesome system you ask ?
It 's a Linux Live CD and a copy of grep or egrep and ls...What a revelation .
Why do n't they just have an actual CS guy on the payroll that knows what he is doing .
Might save millions .</tokentext>
<sentencetext>I have this "top secret" system I developed that is production ready and I'm willing to let it go for 10\% cheaper.
It will also boot from a cd and then run a file from usb (or wherever you want to run it from)and they can enter any crime terms they want to find "hidden" things in text files etc....Whats this awesome system you ask?
It's a Linux Live CD and a copy of grep or egrep and ls...What a revelation.
Why don't they just have an actual CS guy on the payroll that knows what he is doing.
Might save millions.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202111</id>
	<title>Problem...</title>
	<author>Anonymous</author>
	<datestamp>1244026440000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p><div class="quote"><p>How about investing more into proper trained cops? How about better education?</p></div><p>Cops receiving official training as computer forensics are no longer simple beat cops - they are computer forensics experts and they should be treated and paid as such.<br>So, besides their police training they would probably require something equivalent to a BA/BS.</p><p>And even if there was enough time and money to educate and pay them later - system needs its beat cops too. Not just highly trained computer forensics.</p><p>What they would like to have is a <i>"breathalyser-style tool for computers that could instantly flag up illegal activity on any PC it's attached to".</i><br>Which is delusional, even when you limit it to <i>"a simple tool to preview on site and identify there's that one email [they] are looking for [so they] can then use that and interview the person now, rather then waiting six to 12 months for the evidence to come back"</i> in cases such as <i>"credit card fraud or selling stolen goods online".</i></p></div>
	</htmltext>
<tokenext>How about investing more into proper trained cops ?
How about better education ? Cops receiving official training as computer forensics are no longer simple beat cops - they are computer forensics experts and they should be treated and paid as such.So , besides their police training they would probably require something equivalent to a BA/BS.And even if there was enough time and money to educate and pay them later - system needs its beat cops too .
Not just highly trained computer forensics.What they would like to have is a " breathalyser-style tool for computers that could instantly flag up illegal activity on any PC it 's attached to " .Which is delusional , even when you limit it to " a simple tool to preview on site and identify there 's that one email [ they ] are looking for [ so they ] can then use that and interview the person now , rather then waiting six to 12 months for the evidence to come back " in cases such as " credit card fraud or selling stolen goods online " .</tokentext>
<sentencetext>How about investing more into proper trained cops?
How about better education?Cops receiving official training as computer forensics are no longer simple beat cops - they are computer forensics experts and they should be treated and paid as such.So, besides their police training they would probably require something equivalent to a BA/BS.And even if there was enough time and money to educate and pay them later - system needs its beat cops too.
Not just highly trained computer forensics.What they would like to have is a "breathalyser-style tool for computers that could instantly flag up illegal activity on any PC it's attached to".Which is delusional, even when you limit it to "a simple tool to preview on site and identify there's that one email [they] are looking for [so they] can then use that and interview the person now, rather then waiting six to 12 months for the evidence to come back" in cases such as "credit card fraud or selling stolen goods online".
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200885</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200653</id>
	<title>If voting machines are anything to go by....</title>
	<author>MasseKid</author>
	<datestamp>1244021400000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext>Then there will be no problems with this technology!</htmltext>
<tokenext>Then there will be no problems with this technology !</tokentext>
<sentencetext>Then there will be no problems with this technology!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200507</id>
	<title>First among other things...</title>
	<author>Anonymous</author>
	<datestamp>1244020980000</datestamp>
	<modclass>Funny</modclass>
	<modscore>5</modscore>
	<htmltext><p>this is probably something everybody should have, just to make sure they're in compliance.</p></htmltext>
<tokenext>this is probably something everybody should have , just to make sure they 're in compliance .</tokentext>
<sentencetext>this is probably something everybody should have, just to make sure they're in compliance.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201191</id>
	<title>Re:Why not....</title>
	<author>twidarkling</author>
	<datestamp>1244023380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Because that would explicitly be in contradiction of their policy of ISPs keeping information available for a minimum amount of time, aka: Your information isn't yours to delete.</p></htmltext>
<tokenext>Because that would explicitly be in contradiction of their policy of ISPs keeping information available for a minimum amount of time , aka : Your information is n't yours to delete .</tokentext>
<sentencetext>Because that would explicitly be in contradiction of their policy of ISPs keeping information available for a minimum amount of time, aka: Your information isn't yours to delete.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200869</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201897</id>
	<title>Oh Right...</title>
	<author>changa</author>
	<datestamp>1244025720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If they can get that then I want a pony.</p></htmltext>
<tokenext>If they can get that then I want a pony .</tokentext>
<sentencetext>If they can get that then I want a pony.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200807</id>
	<title>Re:Great...</title>
	<author>Quiet\_Desperation</author>
	<datestamp>1244021880000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p><div class="quote"><p>Officer: I pushed the button, and the computer told me to arrest him.</p></div><p>Pffft! You think too small, and will never take over the world.</p><p>Corrected version follows.</p><p>Attorney: How do you know he had illegal material on his computer?<br>Officer: The computer called us and informed on its owner.<br>Attorney: It called you?<br>Officer: Yeah. And so did yours. You still want to question me, Mr. 500Gig Chubby Porn Collection?</p></div>
	</htmltext>
<tokenext>Officer : I pushed the button , and the computer told me to arrest him.Pffft !
You think too small , and will never take over the world.Corrected version follows.Attorney : How do you know he had illegal material on his computer ? Officer : The computer called us and informed on its owner.Attorney : It called you ? Officer : Yeah .
And so did yours .
You still want to question me , Mr. 500Gig Chubby Porn Collection ?</tokentext>
<sentencetext>Officer: I pushed the button, and the computer told me to arrest him.Pffft!
You think too small, and will never take over the world.Corrected version follows.Attorney: How do you know he had illegal material on his computer?Officer: The computer called us and informed on its owner.Attorney: It called you?Officer: Yeah.
And so did yours.
You still want to question me, Mr. 500Gig Chubby Porn Collection?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204925</id>
	<title>Re:Hmm</title>
	<author>renimar</author>
	<datestamp>1244042040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Hey, borrowing something they've seen on American TV worked once:</p><blockquote><div><p>One of the stranger impacts of the show occurred on January 31, 2006, when The <i>West Wing</i> was said to have played a hand in defeating Tony Blair's government in the British House of Commons, during the so called "<i>West Wing</i> Plot". The plan was allegedly hatched after a Conservative Member of Parliament watched the episode, "A Good Day", in which Democrats block a bill aimed at limiting stem cell research, by hiding in an office until the Republican Speaker calls the vote. (<a href="http://en.wikipedia.org/wiki/The\_West\_Wing#Social\_impact" title="wikipedia.org" rel="nofollow">Source</a> [wikipedia.org])</p></div></blockquote><p>Maybe the cops thought, 'Hey, if it worked for the politicians, it must work for us, too!"</p></div>
	</htmltext>
<tokenext>Hey , borrowing something they 've seen on American TV worked once : One of the stranger impacts of the show occurred on January 31 , 2006 , when The West Wing was said to have played a hand in defeating Tony Blair 's government in the British House of Commons , during the so called " West Wing Plot " .
The plan was allegedly hatched after a Conservative Member of Parliament watched the episode , " A Good Day " , in which Democrats block a bill aimed at limiting stem cell research , by hiding in an office until the Republican Speaker calls the vote .
( Source [ wikipedia.org ] ) Maybe the cops thought , 'Hey , if it worked for the politicians , it must work for us , too !
"</tokentext>
<sentencetext>Hey, borrowing something they've seen on American TV worked once:One of the stranger impacts of the show occurred on January 31, 2006, when The West Wing was said to have played a hand in defeating Tony Blair's government in the British House of Commons, during the so called "West Wing Plot".
The plan was allegedly hatched after a Conservative Member of Parliament watched the episode, "A Good Day", in which Democrats block a bill aimed at limiting stem cell research, by hiding in an office until the Republican Speaker calls the vote.
(Source [wikipedia.org])Maybe the cops thought, 'Hey, if it worked for the politicians, it must work for us, too!
"
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200607</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201159</id>
	<title>Alicia Silverstone running UK?</title>
	<author>Anonymous</author>
	<datestamp>1244023260000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I'm having a hard time understanding how they intend to automate these things.  Okay, documents presumably you can scan for keywords.  Of course, if the list of keywords ever gets out (government never leaks anything, right?), that becomes pointless.

But pictures?  How do you automate scanning pictures for illegal material?  File name is not useful (rename?).  MD5 Hash?  All we need to do is toggle one random bit of the file and the hash value is completely different (that is an attribute of a good hash).  And where would they get the hash values in the first place?

This sounds like yet another request by the technically clueless.  Wish I lived in the UK.  There's probably a nice big pot of Sterling waiting to be doled out by those clueless folks.</htmltext>
<tokenext>I 'm having a hard time understanding how they intend to automate these things .
Okay , documents presumably you can scan for keywords .
Of course , if the list of keywords ever gets out ( government never leaks anything , right ?
) , that becomes pointless .
But pictures ?
How do you automate scanning pictures for illegal material ?
File name is not useful ( rename ? ) .
MD5 Hash ?
All we need to do is toggle one random bit of the file and the hash value is completely different ( that is an attribute of a good hash ) .
And where would they get the hash values in the first place ?
This sounds like yet another request by the technically clueless .
Wish I lived in the UK .
There 's probably a nice big pot of Sterling waiting to be doled out by those clueless folks .</tokentext>
<sentencetext>I'm having a hard time understanding how they intend to automate these things.
Okay, documents presumably you can scan for keywords.
Of course, if the list of keywords ever gets out (government never leaks anything, right?
), that becomes pointless.
But pictures?
How do you automate scanning pictures for illegal material?
File name is not useful (rename?).
MD5 Hash?
All we need to do is toggle one random bit of the file and the hash value is completely different (that is an attribute of a good hash).
And where would they get the hash values in the first place?
This sounds like yet another request by the technically clueless.
Wish I lived in the UK.
There's probably a nice big pot of Sterling waiting to be doled out by those clueless folks.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200607</id>
	<title>Hmm</title>
	<author>Co0Ps</author>
	<datestamp>1244021280000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext>I think the UK Police got this idea while watching CSI.</htmltext>
<tokenext>I think the UK Police got this idea while watching CSI .</tokentext>
<sentencetext>I think the UK Police got this idea while watching CSI.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202361</id>
	<title>Re:Great...</title>
	<author>zMaile</author>
	<datestamp>1244027280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I can't help but think of the receptionist in Idocracy . . .</htmltext>
<tokenext>I ca n't help but think of the receptionist in Idocracy .
. .</tokentext>
<sentencetext>I can't help but think of the receptionist in Idocracy .
. .</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200885</id>
	<title>How desperate are they?</title>
	<author>fluch</author>
	<datestamp>1244022180000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>4</modscore>
	<htmltext><p>"...allowing untrained cops to detect anything from correspondence on stolen goods to child pornography. Police in the UK are desperate for a way of slashing the backlog of machines seized by the police in raids..."</p><p>How about investing more into proper trained cops? How about better education? That might help a bit... together with "Maybe they shouldn't seize so many computers".</p></htmltext>
<tokenext>" ...allowing untrained cops to detect anything from correspondence on stolen goods to child pornography .
Police in the UK are desperate for a way of slashing the backlog of machines seized by the police in raids... " How about investing more into proper trained cops ?
How about better education ?
That might help a bit... together with " Maybe they should n't seize so many computers " .</tokentext>
<sentencetext>"...allowing untrained cops to detect anything from correspondence on stolen goods to child pornography.
Police in the UK are desperate for a way of slashing the backlog of machines seized by the police in raids..."How about investing more into proper trained cops?
How about better education?
That might help a bit... together with "Maybe they shouldn't seize so many computers".</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201359</id>
	<title>Re:Should be easy in the UK.</title>
	<author>shadowknot</author>
	<datestamp>1244023860000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext>This is fine in theory but the policy of seizure is generally a yank the power, bag it up and send it to the sweaty geeks (us).  So even if the TrueCrypt volume is mounted when seized it will be a big old pile of meaningless binary junk once the pro's get their hands on it!  Most of the time I have seen TC installed on a suspect's machine (maybe twice to be honest) I have found the passphrase in a handy text file (normaly named passwords.txt or secrets.doc)!</htmltext>
<tokenext>This is fine in theory but the policy of seizure is generally a yank the power , bag it up and send it to the sweaty geeks ( us ) .
So even if the TrueCrypt volume is mounted when seized it will be a big old pile of meaningless binary junk once the pro 's get their hands on it !
Most of the time I have seen TC installed on a suspect 's machine ( maybe twice to be honest ) I have found the passphrase in a handy text file ( normaly named passwords.txt or secrets.doc ) !</tokentext>
<sentencetext>This is fine in theory but the policy of seizure is generally a yank the power, bag it up and send it to the sweaty geeks (us).
So even if the TrueCrypt volume is mounted when seized it will be a big old pile of meaningless binary junk once the pro's get their hands on it!
Most of the time I have seen TC installed on a suspect's machine (maybe twice to be honest) I have found the passphrase in a handy text file (normaly named passwords.txt or secrets.doc)!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200905</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202067</id>
	<title>Very easy to do...</title>
	<author>Anonymous</author>
	<datestamp>1244026320000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>1</modscore>
	<htmltext><p>...all it takes is to load up some FM onto the USB device.</p><p>*FM = "Fucking Magic"</p></htmltext>
<tokenext>...all it takes is to load up some FM onto the USB device .
* FM = " Fucking Magic "</tokentext>
<sentencetext>...all it takes is to load up some FM onto the USB device.
*FM = "Fucking Magic"</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207047</id>
	<title>Re:How desperate are they?</title>
	<author>Anonymous</author>
	<datestamp>1244112480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Visions of A Clockwork Orange are flashing through my head. Specifically, the bit where the main characters goon friends become police...</p></htmltext>
<tokenext>Visions of A Clockwork Orange are flashing through my head .
Specifically , the bit where the main characters goon friends become police.. .</tokentext>
<sentencetext>Visions of A Clockwork Orange are flashing through my head.
Specifically, the bit where the main characters goon friends become police...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200885</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28208279</id>
	<title>UK cybercops demand magical digital snake-oil</title>
	<author>David Gerard</author>
	<datestamp>1244124540000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>3</modscore>
	<htmltext><p>UK police are asking for a "breathalyser"-style tool for computers that could instantly flag up illegal activity <a href="http://notnews.today.com/2008/12/11/uk-cybercops-demand-magical-digital-snake-oil-machines/" title="today.com">on any PC it is attached to</a> [today.com].

</p><p>Detective Superintendent Charlie McMurdie, who is what passes for a computer expert in the police force, said such a tool could run on suspects' machines, instantly read and analyse their email, web browsing and chat logs, identify credit card fraud or selling stolen goods online, reliably detect and assess images containing children on the five-level child porn scale and create a handy log of relevant evidence. And a pony.

</p><p>"It's surely just a simple matter of programming," said McMurdie. "We're seizing so many computers from people with a copy of Virgin Killer that frontline police need a digital forensic tool as easy to use as the breathalyser, to magically flash up 'HONEST UPSTANDING CITIZEN' or ''E'S A NONCE, GUV'. Do we need to seize five computers, all their mobile phones, their CD and DVD collection and basically everything that runs on electricity, or could we use a magical police gadget with impressive flashy lights and stuff? I thought computers were supposed to make life easier!"

</p><p>The eventual development of such a tool could help ease a backlog of digital forensic work that has officers waiting up to a year for evidence to be recovered from seized machines, though threatening to destroy people's livelihoods has proven very efficient in extracting confessions.

</p><p>EDS Capita Goatse have promised they can "absolutely, definitely, certainly, probably" produce such a tool with only an ironclad GBP100m five year contract, and also reliably determine whether a computer program halts or not. The Internet Watch Foundation also demanded to be involved, and were told their details would be kept on file.

</p><p>"It was so much simpler in the old days," sighed McMurdie. "People asking you what time it was, burglars with domino masks and striped jumpers and bags marked 'SWAG,' chirpy Cockney sparrow second-hand car dealers wiv a heart of gold<nobr> <wbr></nobr>... you just can't get the wood, you know."</p></htmltext>
<tokenext>UK police are asking for a " breathalyser " -style tool for computers that could instantly flag up illegal activity on any PC it is attached to [ today.com ] .
Detective Superintendent Charlie McMurdie , who is what passes for a computer expert in the police force , said such a tool could run on suspects ' machines , instantly read and analyse their email , web browsing and chat logs , identify credit card fraud or selling stolen goods online , reliably detect and assess images containing children on the five-level child porn scale and create a handy log of relevant evidence .
And a pony .
" It 's surely just a simple matter of programming , " said McMurdie .
" We 're seizing so many computers from people with a copy of Virgin Killer that frontline police need a digital forensic tool as easy to use as the breathalyser , to magically flash up 'HONEST UPSTANDING CITIZEN ' or ''E 'S A NONCE , GUV' .
Do we need to seize five computers , all their mobile phones , their CD and DVD collection and basically everything that runs on electricity , or could we use a magical police gadget with impressive flashy lights and stuff ?
I thought computers were supposed to make life easier !
" The eventual development of such a tool could help ease a backlog of digital forensic work that has officers waiting up to a year for evidence to be recovered from seized machines , though threatening to destroy people 's livelihoods has proven very efficient in extracting confessions .
EDS Capita Goatse have promised they can " absolutely , definitely , certainly , probably " produce such a tool with only an ironclad GBP100m five year contract , and also reliably determine whether a computer program halts or not .
The Internet Watch Foundation also demanded to be involved , and were told their details would be kept on file .
" It was so much simpler in the old days , " sighed McMurdie .
" People asking you what time it was , burglars with domino masks and striped jumpers and bags marked 'SWAG, ' chirpy Cockney sparrow second-hand car dealers wiv a heart of gold ... you just ca n't get the wood , you know .
"</tokentext>
<sentencetext>UK police are asking for a "breathalyser"-style tool for computers that could instantly flag up illegal activity on any PC it is attached to [today.com].
Detective Superintendent Charlie McMurdie, who is what passes for a computer expert in the police force, said such a tool could run on suspects' machines, instantly read and analyse their email, web browsing and chat logs, identify credit card fraud or selling stolen goods online, reliably detect and assess images containing children on the five-level child porn scale and create a handy log of relevant evidence.
And a pony.
"It's surely just a simple matter of programming," said McMurdie.
"We're seizing so many computers from people with a copy of Virgin Killer that frontline police need a digital forensic tool as easy to use as the breathalyser, to magically flash up 'HONEST UPSTANDING CITIZEN' or ''E'S A NONCE, GUV'.
Do we need to seize five computers, all their mobile phones, their CD and DVD collection and basically everything that runs on electricity, or could we use a magical police gadget with impressive flashy lights and stuff?
I thought computers were supposed to make life easier!
"

The eventual development of such a tool could help ease a backlog of digital forensic work that has officers waiting up to a year for evidence to be recovered from seized machines, though threatening to destroy people's livelihoods has proven very efficient in extracting confessions.
EDS Capita Goatse have promised they can "absolutely, definitely, certainly, probably" produce such a tool with only an ironclad GBP100m five year contract, and also reliably determine whether a computer program halts or not.
The Internet Watch Foundation also demanded to be involved, and were told their details would be kept on file.
"It was so much simpler in the old days," sighed McMurdie.
"People asking you what time it was, burglars with domino masks and striped jumpers and bags marked 'SWAG,' chirpy Cockney sparrow second-hand car dealers wiv a heart of gold ... you just can't get the wood, you know.
"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200617</id>
	<title>Note to self:</title>
	<author>ground.zero.612</author>
	<datestamp>1244021280000</datestamp>
	<modclass>Redundant</modclass>
	<modscore>0</modscore>
	<htmltext>Remember to wire USB pins to secret kill-switch designed to dump excessive current into said USB device.</htmltext>
<tokenext>Remember to wire USB pins to secret kill-switch designed to dump excessive current into said USB device .</tokentext>
<sentencetext>Remember to wire USB pins to secret kill-switch designed to dump excessive current into said USB device.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200723</id>
	<title>Lazy</title>
	<author>gubers33</author>
	<datestamp>1244021640000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>These cops seem extremely lazy we don't want to do our work we want someone to write a computer to do it for us. Even if someone does manage this for them I would be curious to see how an automated usb drive will deal with compressed zip files and encrypted files.</htmltext>
<tokenext>These cops seem extremely lazy we do n't want to do our work we want someone to write a computer to do it for us .
Even if someone does manage this for them I would be curious to see how an automated usb drive will deal with compressed zip files and encrypted files .</tokentext>
<sentencetext>These cops seem extremely lazy we don't want to do our work we want someone to write a computer to do it for us.
Even if someone does manage this for them I would be curious to see how an automated usb drive will deal with compressed zip files and encrypted files.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201677</id>
	<title>Zapp!</title>
	<author>Anonymous</author>
	<datestamp>1244025060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>What a shame that my computer is "broken" and sends a 240V blast through its USB ports...</p></htmltext>
<tokenext>What a shame that my computer is " broken " and sends a 240V blast through its USB ports.. .</tokentext>
<sentencetext>What a shame that my computer is "broken" and sends a 240V blast through its USB ports...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203739</id>
	<title>That's a different thing</title>
	<author>I)\_MaLaClYpSe\_(I</author>
	<datestamp>1244033160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The COFEE stick is used for "merely" acquiring digital evidence. See this part of your quote:<p><div class="quote"><p>for later interpretation by computer experts</p></div><p>
The summary describes a tool that will also <i>interpret</i> the evidence found. </p><p>What COFEE will do for you is to gather volatile information on life windows systems like running processes, open network connections, system date and time, RAM contents etc. The disk contents are not acquired as they will supposedly remain as they are.
</p><p>
In contrast to this the tool the summary mentions should not acquire any evidence but instead search through existing evidence and interpret it, like searching through your harddrive for keywords on a bad word list or searching for hashes of known kiddypr0n etc.
</p><p>
There is a big difference there:</p><p>
If Microsoft's tool is the equivalent of a toolkit designed to help a cop take a sample of your blood for later testing of anything illegal in your blood that will not be there anymore several hours later when a doctor will do the same, the tool described in the summary is the equivalent of a tool designed to tell the cop if there is anything illegal in your blood without acquiring the blood for later analysis by an expert.
</p><p>
Although this is quite a bad analogy as the device in my analogy might well be technically feasibly. Let's instead consider the following analogy:</p><p>

Instead of using a camera in order to take pictures of a suspected crime scene they want to use a device similar to a camera that instead of acquiring evidence from <i>suspected</i> crime scenes will allow a cop to look through it at <i>any scene</i> in order to see if a crime has happened at all.</p><p>
Imagine a cop on the open street looking through a camera at you and then getting arrested because the camera told him that you somehow supposedly committed a crime.</p></div>
	</htmltext>
<tokenext>The COFEE stick is used for " merely " acquiring digital evidence .
See this part of your quote : for later interpretation by computer experts The summary describes a tool that will also interpret the evidence found .
What COFEE will do for you is to gather volatile information on life windows systems like running processes , open network connections , system date and time , RAM contents etc .
The disk contents are not acquired as they will supposedly remain as they are .
In contrast to this the tool the summary mentions should not acquire any evidence but instead search through existing evidence and interpret it , like searching through your harddrive for keywords on a bad word list or searching for hashes of known kiddypr0n etc .
There is a big difference there : If Microsoft 's tool is the equivalent of a toolkit designed to help a cop take a sample of your blood for later testing of anything illegal in your blood that will not be there anymore several hours later when a doctor will do the same , the tool described in the summary is the equivalent of a tool designed to tell the cop if there is anything illegal in your blood without acquiring the blood for later analysis by an expert .
Although this is quite a bad analogy as the device in my analogy might well be technically feasibly .
Let 's instead consider the following analogy : Instead of using a camera in order to take pictures of a suspected crime scene they want to use a device similar to a camera that instead of acquiring evidence from suspected crime scenes will allow a cop to look through it at any scene in order to see if a crime has happened at all .
Imagine a cop on the open street looking through a camera at you and then getting arrested because the camera told him that you somehow supposedly committed a crime .</tokentext>
<sentencetext>The COFEE stick is used for "merely" acquiring digital evidence.
See this part of your quote:for later interpretation by computer experts
The summary describes a tool that will also interpret the evidence found.
What COFEE will do for you is to gather volatile information on life windows systems like running processes, open network connections, system date and time, RAM contents etc.
The disk contents are not acquired as they will supposedly remain as they are.
In contrast to this the tool the summary mentions should not acquire any evidence but instead search through existing evidence and interpret it, like searching through your harddrive for keywords on a bad word list or searching for hashes of known kiddypr0n etc.
There is a big difference there:
If Microsoft's tool is the equivalent of a toolkit designed to help a cop take a sample of your blood for later testing of anything illegal in your blood that will not be there anymore several hours later when a doctor will do the same, the tool described in the summary is the equivalent of a tool designed to tell the cop if there is anything illegal in your blood without acquiring the blood for later analysis by an expert.
Although this is quite a bad analogy as the device in my analogy might well be technically feasibly.
Let's instead consider the following analogy:

Instead of using a camera in order to take pictures of a suspected crime scene they want to use a device similar to a camera that instead of acquiring evidence from suspected crime scenes will allow a cop to look through it at any scene in order to see if a crime has happened at all.
Imagine a cop on the open street looking through a camera at you and then getting arrested because the camera told him that you somehow supposedly committed a crime.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200781</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28208647</id>
	<title>USB Tools</title>
	<author>SehbaJoe</author>
	<datestamp>1244126400000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Sorry for the shameless promotion, but some forensic specialist may want to know that Guardware sells a USB tool that scans drives looking for pornographic images and verbiage on any drive.

<a href="http://www.guardware.com/ts\_overview.php" title="guardware.com" rel="nofollow">http://www.guardware.com/ts\_overview.php</a> [guardware.com]</htmltext>
<tokenext>Sorry for the shameless promotion , but some forensic specialist may want to know that Guardware sells a USB tool that scans drives looking for pornographic images and verbiage on any drive .
http : //www.guardware.com/ts \ _overview.php [ guardware.com ]</tokentext>
<sentencetext>Sorry for the shameless promotion, but some forensic specialist may want to know that Guardware sells a USB tool that scans drives looking for pornographic images and verbiage on any drive.
http://www.guardware.com/ts\_overview.php [guardware.com]</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523</id>
	<title>Should be easy in the UK.</title>
	<author>BitterOak</author>
	<datestamp>1244021040000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext>This should be easy to accomplish in the UK where citizens are required by law to turn over all their encryption keys or face jail time.  It would be harder to make it work in the US, where people can use encryption.  I suppose the Brits could employ TrueCrypt hidden volumes to keep their stuff private.</htmltext>
<tokenext>This should be easy to accomplish in the UK where citizens are required by law to turn over all their encryption keys or face jail time .
It would be harder to make it work in the US , where people can use encryption .
I suppose the Brits could employ TrueCrypt hidden volumes to keep their stuff private .</tokentext>
<sentencetext>This should be easy to accomplish in the UK where citizens are required by law to turn over all their encryption keys or face jail time.
It would be harder to make it work in the US, where people can use encryption.
I suppose the Brits could employ TrueCrypt hidden volumes to keep their stuff private.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202415</id>
	<title>Re:Inspired!</title>
	<author>Anonymous</author>
	<datestamp>1244027520000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>1</modscore>
	<htmltext><p>You're missing the point of seizures... or at least one possible point. In a significant number of cases, they're actually not carried out because of a strict need but rather to harass.</p><p>This can be on many levels, too. Maybe it's just the low-level plod on a power trip that thinks he's gonna stick it to you for being a toffee-nosed git; maybe it's some higher-up that wants to get you into trouble (for your political views or actions, perhaps).</p></htmltext>
<tokenext>You 're missing the point of seizures... or at least one possible point .
In a significant number of cases , they 're actually not carried out because of a strict need but rather to harass.This can be on many levels , too .
Maybe it 's just the low-level plod on a power trip that thinks he 's gon na stick it to you for being a toffee-nosed git ; maybe it 's some higher-up that wants to get you into trouble ( for your political views or actions , perhaps ) .</tokentext>
<sentencetext>You're missing the point of seizures... or at least one possible point.
In a significant number of cases, they're actually not carried out because of a strict need but rather to harass.This can be on many levels, too.
Maybe it's just the low-level plod on a power trip that thinks he's gonna stick it to you for being a toffee-nosed git; maybe it's some higher-up that wants to get you into trouble (for your political views or actions, perhaps).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200813</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204729</id>
	<title>I like to see them stick that in my Amiga.</title>
	<author>ancient\_kings</author>
	<datestamp>1244040300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Dumb Officer: "Captain, this computa doesn't appear to have a USB port?"
Even Dumber Officer (Captain) : "Sure it does, I see two in the front. Just use a hammer and tap it in"
Dumb Officer: "Derrrr, okay"</htmltext>
<tokenext>Dumb Officer : " Captain , this computa does n't appear to have a USB port ?
" Even Dumber Officer ( Captain ) : " Sure it does , I see two in the front .
Just use a hammer and tap it in " Dumb Officer : " Derrrr , okay "</tokentext>
<sentencetext>Dumb Officer: "Captain, this computa doesn't appear to have a USB port?
"
Even Dumber Officer (Captain) : "Sure it does, I see two in the front.
Just use a hammer and tap it in"
Dumb Officer: "Derrrr, okay"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200681</id>
	<title>Open Source?</title>
	<author>CheddarHead</author>
	<datestamp>1244021460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I would agree with you as long as the workings of these devices are totally transparent to the public.  That would have to include open source for all of the S/W and algorithms used to determine what material is evidence of illegal activity.  If it's not transparent, then they could claim that anyone's computer shows evidence of illegal activity and there would be no way to defend against it.</p></htmltext>
<tokenext>I would agree with you as long as the workings of these devices are totally transparent to the public .
That would have to include open source for all of the S/W and algorithms used to determine what material is evidence of illegal activity .
If it 's not transparent , then they could claim that anyone 's computer shows evidence of illegal activity and there would be no way to defend against it .</tokentext>
<sentencetext>I would agree with you as long as the workings of these devices are totally transparent to the public.
That would have to include open source for all of the S/W and algorithms used to determine what material is evidence of illegal activity.
If it's not transparent, then they could claim that anyone's computer shows evidence of illegal activity and there would be no way to defend against it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200549</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203987</id>
	<title>Better Yet</title>
	<author>LSDelirious</author>
	<datestamp>1244034720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Why don't they just surgically implant USB ports into the brainstems of every man woman and child in the UK, you know just in case they were THINKING about child porn or terrorism....

second thought, maybe it should be esata instead</htmltext>
<tokenext>Why do n't they just surgically implant USB ports into the brainstems of every man woman and child in the UK , you know just in case they were THINKING about child porn or terrorism... . second thought , maybe it should be esata instead</tokentext>
<sentencetext>Why don't they just surgically implant USB ports into the brainstems of every man woman and child in the UK, you know just in case they were THINKING about child porn or terrorism....

second thought, maybe it should be esata instead</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204485</id>
	<title>A better solution.</title>
	<author>BlueKitties</author>
	<datestamp>1244038440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>... would be to put a portrait of the Prime Minister in every home which has a small spy-cam installed.</htmltext>
<tokenext>... would be to put a portrait of the Prime Minister in every home which has a small spy-cam installed .</tokentext>
<sentencetext>... would be to put a portrait of the Prime Minister in every home which has a small spy-cam installed.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28214193</id>
	<title>Re:Should be easy in the UK.</title>
	<author>SalaSSin</author>
	<datestamp>1244149140000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>In Belgium there is a law that states you can't *oblige* a suspect to incriminate himself, so just invoke that law, and you're safe... I hope (IANAL)</htmltext>
<tokenext>In Belgium there is a law that states you ca n't * oblige * a suspect to incriminate himself , so just invoke that law , and you 're safe... I hope ( IANAL )</tokentext>
<sentencetext>In Belgium there is a law that states you can't *oblige* a suspect to incriminate himself, so just invoke that law, and you're safe... I hope (IANAL)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202117</id>
	<title>Re:USB?</title>
	<author>cbhacking</author>
	<datestamp>1244026500000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>If you can run software on the device, then you don't need drivers, no. Mounting flash drives and the like with noexec would make this a lot more difficult. If they copy data off the flash drive to your system, then the evidence has been tampered with and should no longer be admissible in court. If they know enough to run mount (which may require your password) then they really don't need this "detector" anyhow.</p><p>If the computer is locked and doesn't *automatically* execute code on a USB, then they need your password anyhow. There are lots of simple ways to make this a LOT more difficult. On the flip side, FireWire (with its DMA) might work better here, assuming the DMA hasn't been disabled.</p></htmltext>
<tokenext>If you can run software on the device , then you do n't need drivers , no .
Mounting flash drives and the like with noexec would make this a lot more difficult .
If they copy data off the flash drive to your system , then the evidence has been tampered with and should no longer be admissible in court .
If they know enough to run mount ( which may require your password ) then they really do n't need this " detector " anyhow.If the computer is locked and does n't * automatically * execute code on a USB , then they need your password anyhow .
There are lots of simple ways to make this a LOT more difficult .
On the flip side , FireWire ( with its DMA ) might work better here , assuming the DMA has n't been disabled .</tokentext>
<sentencetext>If you can run software on the device, then you don't need drivers, no.
Mounting flash drives and the like with noexec would make this a lot more difficult.
If they copy data off the flash drive to your system, then the evidence has been tampered with and should no longer be admissible in court.
If they know enough to run mount (which may require your password) then they really don't need this "detector" anyhow.If the computer is locked and doesn't *automatically* execute code on a USB, then they need your password anyhow.
There are lots of simple ways to make this a LOT more difficult.
On the flip side, FireWire (with its DMA) might work better here, assuming the DMA hasn't been disabled.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101</id>
	<title>USB?</title>
	<author>Bert64</author>
	<datestamp>1244023020000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>How would a USB device get access to the host system's drives?<br>Surely that would require drivers to be loaded on the host...<br>Not only would this be very OS specific, but it could easily be defeated, you could configure the host to detect the insertion of this particular type of usb device and perform a secure overwrite of all your incriminating files when such a device is inserted.</p></htmltext>
<tokenext>How would a USB device get access to the host system 's drives ? Surely that would require drivers to be loaded on the host...Not only would this be very OS specific , but it could easily be defeated , you could configure the host to detect the insertion of this particular type of usb device and perform a secure overwrite of all your incriminating files when such a device is inserted .</tokentext>
<sentencetext>How would a USB device get access to the host system's drives?Surely that would require drivers to be loaded on the host...Not only would this be very OS specific, but it could easily be defeated, you could configure the host to detect the insertion of this particular type of usb device and perform a secure overwrite of all your incriminating files when such a device is inserted.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201197</id>
	<title>Hello, United Kingdom?</title>
	<author>Chris Tucker</author>
	<datestamp>1244023380000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>You are all now living in The Village.</p><p>You have a choice.</p><p>You can be numbers, or you can be free men and women.</p><p>The choice is yours.</p><p>Choose wisely.</p></htmltext>
<tokenext>You are all now living in The Village.You have a choice.You can be numbers , or you can be free men and women.The choice is yours.Choose wisely .</tokentext>
<sentencetext>You are all now living in The Village.You have a choice.You can be numbers, or you can be free men and women.The choice is yours.Choose wisely.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203599</id>
	<title>I'm glad</title>
	<author>Runaway1956</author>
	<datestamp>1244032560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Mostly, I'm glad that I keep all my bestiality and S&amp;M in the cloud.  The snuff films, too.  No point in having that stuff on my hard drive, where the cops can find it.  It's all filed in my Gmail account, in the folder below my "Homeland Surveillance spy stuff".  No one will EVER think of looking online!!</p></htmltext>
<tokenext>Mostly , I 'm glad that I keep all my bestiality and S&amp;M in the cloud .
The snuff films , too .
No point in having that stuff on my hard drive , where the cops can find it .
It 's all filed in my Gmail account , in the folder below my " Homeland Surveillance spy stuff " .
No one will EVER think of looking online !
!</tokentext>
<sentencetext>Mostly, I'm glad that I keep all my bestiality and S&amp;M in the cloud.
The snuff films, too.
No point in having that stuff on my hard drive, where the cops can find it.
It's all filed in my Gmail account, in the folder below my "Homeland Surveillance spy stuff".
No one will EVER think of looking online!
!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206371</id>
	<title>Nice!</title>
	<author>kyriacos</author>
	<datestamp>1244146440000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>And after they are done collecting personal information from your laptop, they will forget the USB stick on a bus and, next thing you know, your identity will be sold on eBay.</htmltext>
<tokenext>And after they are done collecting personal information from your laptop , they will forget the USB stick on a bus and , next thing you know , your identity will be sold on eBay .</tokentext>
<sentencetext>And after they are done collecting personal information from your laptop, they will forget the USB stick on a bus and, next thing you know, your identity will be sold on eBay.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200775</id>
	<title>Oh geez!  This is too easy!</title>
	<author>erroneus</author>
	<datestamp>1244021820000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p>If I understand the British government, they wouldn't have any problems with this approach either:</p><p>Let's build a live USB Linux load that knows how to read and write all known file systems including encrypted systems.  Then we will write a few handy scripts that will scan for a fairly long list of known files using MD5sum or some such.  Then, if it doesn't turn anything up, copy some child porn from the USB drive over to the target system and print out the arrest warrant.</p></htmltext>
<tokenext>If I understand the British government , they would n't have any problems with this approach either : Let 's build a live USB Linux load that knows how to read and write all known file systems including encrypted systems .
Then we will write a few handy scripts that will scan for a fairly long list of known files using MD5sum or some such .
Then , if it does n't turn anything up , copy some child porn from the USB drive over to the target system and print out the arrest warrant .</tokentext>
<sentencetext>If I understand the British government, they wouldn't have any problems with this approach either:Let's build a live USB Linux load that knows how to read and write all known file systems including encrypted systems.
Then we will write a few handy scripts that will scan for a fairly long list of known files using MD5sum or some such.
Then, if it doesn't turn anything up, copy some child porn from the USB drive over to the target system and print out the arrest warrant.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203743</id>
	<title>Re:Great...</title>
	<author>AHuxley</author>
	<datestamp>1244033160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Checksums for recovered files.<br>
Every file found in a raid or detected on a network will get a unique id number, hash ect.<br>
What the cops what is a small device.  They see your ip linked to a file on p2p, ie your uploading a known file.<br>They raid your home, plain clothes, with the paper work to hook up your desktop, laptop. <br>Very nice, friendly, isp's get this wrong all the time, can we just cross you off the list.<br>
Eyes scanning for signs of toys in the open.<br>
Searching for the file.<br>If they are smart they drop in a key logger too for any IM details, logs, just to make sure.<br>
If it comes back clear, the keylogger will be in.<br>
If it comes back 'hot' they may give you a false clear too, keylogger loaded.</htmltext>
<tokenext>Checksums for recovered files .
Every file found in a raid or detected on a network will get a unique id number , hash ect .
What the cops what is a small device .
They see your ip linked to a file on p2p , ie your uploading a known file.They raid your home , plain clothes , with the paper work to hook up your desktop , laptop .
Very nice , friendly , isp 's get this wrong all the time , can we just cross you off the list .
Eyes scanning for signs of toys in the open .
Searching for the file.If they are smart they drop in a key logger too for any IM details , logs , just to make sure .
If it comes back clear , the keylogger will be in .
If it comes back 'hot ' they may give you a false clear too , keylogger loaded .</tokentext>
<sentencetext>Checksums for recovered files.
Every file found in a raid or detected on a network will get a unique id number, hash ect.
What the cops what is a small device.
They see your ip linked to a file on p2p, ie your uploading a known file.They raid your home, plain clothes, with the paper work to hook up your desktop, laptop.
Very nice, friendly, isp's get this wrong all the time, can we just cross you off the list.
Eyes scanning for signs of toys in the open.
Searching for the file.If they are smart they drop in a key logger too for any IM details, logs, just to make sure.
If it comes back clear, the keylogger will be in.
If it comes back 'hot' they may give you a false clear too, keylogger loaded.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200975</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202049</id>
	<title>Well, US TSA has been using this since last year</title>
	<author>Anonymous</author>
	<datestamp>1244026200000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>US TSA has been using these since last year to copy my hidden TrueCrypt file containers every time I go through airport security. So far so good.</htmltext>
<tokenext>US TSA has been using these since last year to copy my hidden TrueCrypt file containers every time I go through airport security .
So far so good .</tokentext>
<sentencetext>US TSA has been using these since last year to copy my hidden TrueCrypt file containers every time I go through airport security.
So far so good.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201429</id>
	<title>Could get painful!</title>
	<author>Anonymous</author>
	<datestamp>1244024160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Well I hope the PC's know which PC's to plug the detector into, or it could get painful<nobr> <wbr></nobr>;-) Or are the PC's helmet's getting a USB upgrade?</p></htmltext>
<tokenext>Well I hope the PC 's know which PC 's to plug the detector into , or it could get painful ; - ) Or are the PC 's helmet 's getting a USB upgrade ?</tokentext>
<sentencetext>Well I hope the PC's know which PC's to plug the detector into, or it could get painful ;-) Or are the PC's helmet's getting a USB upgrade?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200717</id>
	<title>Re:Encryption=suspicious?</title>
	<author>Anonymous</author>
	<datestamp>1244021640000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>3</modscore>
	<htmltext><p>That whole "innocent until proven guilty" thing is something that the Founding Fathers felt strongly about...having lived in England.</p></htmltext>
<tokenext>That whole " innocent until proven guilty " thing is something that the Founding Fathers felt strongly about...having lived in England .</tokentext>
<sentencetext>That whole "innocent until proven guilty" thing is something that the Founding Fathers felt strongly about...having lived in England.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200645</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201561</id>
	<title>Plug a hardware random number generator to SATA0</title>
	<author>Anonymous</author>
	<datestamp>1244024700000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>Create a small pseudo random number generator that connects to sata0. They start scanning. They learn about the "halting problem"</htmltext>
<tokenext>Create a small pseudo random number generator that connects to sata0 .
They start scanning .
They learn about the " halting problem "</tokentext>
<sentencetext>Create a small pseudo random number generator that connects to sata0.
They start scanning.
They learn about the "halting problem"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200909</id>
	<title>maybe more people should own PCs</title>
	<author>Anonymous</author>
	<datestamp>1244022300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>maybe more people should own PCs in the UK...it will be better in the long run for civil liberties.</p><p>Especially those people who are more likely to get things seized in a police raid.<br>The purpose, to increase the backlog so much that the police will rethink their policy of seizing computers.</p><p>That, and it'll help local computer shop owners with a flood of business as by the time the people get their computers back, it will be obsolete that they would have to buy a new one...essentially paid for by the police department.<br>Talk about a stimulus plan.</p></htmltext>
<tokenext>maybe more people should own PCs in the UK...it will be better in the long run for civil liberties.Especially those people who are more likely to get things seized in a police raid.The purpose , to increase the backlog so much that the police will rethink their policy of seizing computers.That , and it 'll help local computer shop owners with a flood of business as by the time the people get their computers back , it will be obsolete that they would have to buy a new one...essentially paid for by the police department.Talk about a stimulus plan .</tokentext>
<sentencetext>maybe more people should own PCs in the UK...it will be better in the long run for civil liberties.Especially those people who are more likely to get things seized in a police raid.The purpose, to increase the backlog so much that the police will rethink their policy of seizing computers.That, and it'll help local computer shop owners with a flood of business as by the time the people get their computers back, it will be obsolete that they would have to buy a new one...essentially paid for by the police department.Talk about a stimulus plan.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201893</id>
	<title>Oh yeah?</title>
	<author>Anonymous</author>
	<datestamp>1244025720000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I'll just create a non-zero-length empty file, format it to some obscure file system, add everything suspicious to it then<nobr> <wbr></nobr>.tar.bz2 it and place it in an obscure location on my Ext4 / partition.</p></htmltext>
<tokenext>I 'll just create a non-zero-length empty file , format it to some obscure file system , add everything suspicious to it then .tar.bz2 it and place it in an obscure location on my Ext4 / partition .</tokentext>
<sentencetext>I'll just create a non-zero-length empty file, format it to some obscure file system, add everything suspicious to it then .tar.bz2 it and place it in an obscure location on my Ext4 / partition.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201007</id>
	<title>Re:Great...</title>
	<author>Bryansix</author>
	<datestamp>1244022660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Just remind me not to move to the UK.</htmltext>
<tokenext>Just remind me not to move to the UK .</tokentext>
<sentencetext>Just remind me not to move to the UK.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200801</id>
	<title>roflcopter</title>
	<author>Anonymous</author>
	<datestamp>1244021820000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>i'm sure this will work wonders with a laptop running full volume crypto.</p><p>lawl!</p></htmltext>
<tokenext>i 'm sure this will work wonders with a laptop running full volume crypto.lawl !</tokentext>
<sentencetext>i'm sure this will work wonders with a laptop running full volume crypto.lawl!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200901</id>
	<title>Re:Great...</title>
	<author>ve3id</author>
	<datestamp>1244022240000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>5</modscore>
	<htmltext>This reminds me of another idiot device they gave to the British bobby: back in the 70's and 80's, there was a glut of illegal CB sets in England. They never legalised the use of 27MHz AM/SSB CBs and all the units sold were marked 'for export only'

When they legalised CB, units that were approved could only transmit FM.  Instead of overworking the radio inspectors, they gave bobbies on the beat a box that detected if a close transmitter was AM or FM, with two LEDs.  The only problem was amateur radio operators can legally use AM and SSB (after all, they invented it!).  One beat p.c. stopped a ham and asked him to talk in the mike, and, you guessed it, the illegal CB light lit up!

Only when the amateur radio operator started cursing and swearing at the p.c. and getting red in the face did he consult another p.c. over the police radio who was a ham.  This being the appropriate behaviour for a ham accused of being a CB'er, he let him go with an apology.</htmltext>
<tokenext>This reminds me of another idiot device they gave to the British bobby : back in the 70 's and 80 's , there was a glut of illegal CB sets in England .
They never legalised the use of 27MHz AM/SSB CBs and all the units sold were marked 'for export only ' When they legalised CB , units that were approved could only transmit FM .
Instead of overworking the radio inspectors , they gave bobbies on the beat a box that detected if a close transmitter was AM or FM , with two LEDs .
The only problem was amateur radio operators can legally use AM and SSB ( after all , they invented it ! ) .
One beat p.c .
stopped a ham and asked him to talk in the mike , and , you guessed it , the illegal CB light lit up !
Only when the amateur radio operator started cursing and swearing at the p.c .
and getting red in the face did he consult another p.c .
over the police radio who was a ham .
This being the appropriate behaviour for a ham accused of being a CB'er , he let him go with an apology .</tokentext>
<sentencetext>This reminds me of another idiot device they gave to the British bobby: back in the 70's and 80's, there was a glut of illegal CB sets in England.
They never legalised the use of 27MHz AM/SSB CBs and all the units sold were marked 'for export only'

When they legalised CB, units that were approved could only transmit FM.
Instead of overworking the radio inspectors, they gave bobbies on the beat a box that detected if a close transmitter was AM or FM, with two LEDs.
The only problem was amateur radio operators can legally use AM and SSB (after all, they invented it!).
One beat p.c.
stopped a ham and asked him to talk in the mike, and, you guessed it, the illegal CB light lit up!
Only when the amateur radio operator started cursing and swearing at the p.c.
and getting red in the face did he consult another p.c.
over the police radio who was a ham.
This being the appropriate behaviour for a ham accused of being a CB'er, he let him go with an apology.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202507</id>
	<title>Police want a magic stick that can tell the future</title>
	<author>Anonymous</author>
	<datestamp>1244027820000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>In other news, daemons were driven from a pig in Gloucester. Apparently a local farmer mistook it for a dead badger...</p></htmltext>
<tokenext>In other news , daemons were driven from a pig in Gloucester .
Apparently a local farmer mistook it for a dead badger.. .</tokentext>
<sentencetext>In other news, daemons were driven from a pig in Gloucester.
Apparently a local farmer mistook it for a dead badger...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200811</id>
	<title>policeficker</title>
	<author>Anonymous</author>
	<datestamp>1244021880000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>That was not a long ago: pandemic of malware that spreaded on usb dongles...</p></htmltext>
<tokenext>That was not a long ago : pandemic of malware that spreaded on usb dongles.. .</tokentext>
<sentencetext>That was not a long ago: pandemic of malware that spreaded on usb dongles...</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206649</id>
	<title>Re:Should be easy in the UK.</title>
	<author>Anonymous</author>
	<datestamp>1244107020000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p>This should be easy to accomplish in the UK where citizens are required by law to turn over all their encryption keys or face jail time.  It would be harder to make it work in the US, where people can use encryption.  I suppose the Brits could employ TrueCrypt hidden volumes to keep their stuff private.</p></div><p>I use truecrypt hidden volumes anyway, but the question is how will this run on Linux or BSD from the I cannot run the<nobr> <wbr></nobr>.exe dept.</p><p>I am sure there is someway easy way to fry their USB drives when plugged in... maybe another slashdoter can enlighten us on this?</p></div>
	</htmltext>
<tokenext>This should be easy to accomplish in the UK where citizens are required by law to turn over all their encryption keys or face jail time .
It would be harder to make it work in the US , where people can use encryption .
I suppose the Brits could employ TrueCrypt hidden volumes to keep their stuff private.I use truecrypt hidden volumes anyway , but the question is how will this run on Linux or BSD from the I can not run the .exe dept.I am sure there is someway easy way to fry their USB drives when plugged in... maybe another slashdoter can enlighten us on this ?</tokentext>
<sentencetext>This should be easy to accomplish in the UK where citizens are required by law to turn over all their encryption keys or face jail time.
It would be harder to make it work in the US, where people can use encryption.
I suppose the Brits could employ TrueCrypt hidden volumes to keep their stuff private.I use truecrypt hidden volumes anyway, but the question is how will this run on Linux or BSD from the I cannot run the .exe dept.I am sure there is someway easy way to fry their USB drives when plugged in... maybe another slashdoter can enlighten us on this?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205975</id>
	<title>Re:Hmm</title>
	<author>TheQuantumShift</author>
	<datestamp>1244053560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The magical-ness of the device points more towards Torchwood...</htmltext>
<tokenext>The magical-ness of the device points more towards Torchwood.. .</tokentext>
<sentencetext>The magical-ness of the device points more towards Torchwood...</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200607</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201027</id>
	<title>Re:and the companion product....</title>
	<author>blueg3</author>
	<datestamp>1244022720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Well, on my computer, none of the USB ports are actually connected. So, can anyone do it in less than zero?</p></htmltext>
<tokenext>Well , on my computer , none of the USB ports are actually connected .
So , can anyone do it in less than zero ?</tokentext>
<sentencetext>Well, on my computer, none of the USB ports are actually connected.
So, can anyone do it in less than zero?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200623</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204611</id>
	<title>Re:Encryption=suspicious?</title>
	<author>zippthorne</author>
	<datestamp>1244039280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Huh?  Last I checked both Windows Vista Ultimate Edition and OS X 10.5 "Leopard" on-every-new-machine-that-apple-ships edition include encryption right out of the box.</p><p>And linux, of course, which doesn't shoehorn you into "full disk only" or "specified dirs only" depending on who's logo is on the machine.</p><p>And every browser on those three OSes and most others has its own encryption or uses the OS's built-in encryption for storage of auto-fill data.</p><p>Who, exactly, does having encryption incriminate, again?</p></htmltext>
<tokenext>Huh ?
Last I checked both Windows Vista Ultimate Edition and OS X 10.5 " Leopard " on-every-new-machine-that-apple-ships edition include encryption right out of the box.And linux , of course , which does n't shoehorn you into " full disk only " or " specified dirs only " depending on who 's logo is on the machine.And every browser on those three OSes and most others has its own encryption or uses the OS 's built-in encryption for storage of auto-fill data.Who , exactly , does having encryption incriminate , again ?</tokentext>
<sentencetext>Huh?
Last I checked both Windows Vista Ultimate Edition and OS X 10.5 "Leopard" on-every-new-machine-that-apple-ships edition include encryption right out of the box.And linux, of course, which doesn't shoehorn you into "full disk only" or "specified dirs only" depending on who's logo is on the machine.And every browser on those three OSes and most others has its own encryption or uses the OS's built-in encryption for storage of auto-fill data.Who, exactly, does having encryption incriminate, again?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200645</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202411</id>
	<title>Re:Lazy</title>
	<author>evil\_aar0n</author>
	<datestamp>1244027460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I agree.  It would be so much more efficient if all of us would slip on the manacles, ourselves, and march ourselves down to the local police station where we could find ourselves a nice, new jail cell.  After all, we wouldn't want to make their jobs more difficult, now, would we?</p></htmltext>
<tokenext>I agree .
It would be so much more efficient if all of us would slip on the manacles , ourselves , and march ourselves down to the local police station where we could find ourselves a nice , new jail cell .
After all , we would n't want to make their jobs more difficult , now , would we ?</tokentext>
<sentencetext>I agree.
It would be so much more efficient if all of us would slip on the manacles, ourselves, and march ourselves down to the local police station where we could find ourselves a nice, new jail cell.
After all, we wouldn't want to make their jobs more difficult, now, would we?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200723</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201705</id>
	<title>Re:Great...</title>
	<author>Anonymous</author>
	<datestamp>1244025120000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>And thus was a "Mr. Tuttle" overcharged for information retrieval.  Or was that "Mr. Buttle"?</p></htmltext>
<tokenext>And thus was a " Mr. Tuttle " overcharged for information retrieval .
Or was that " Mr. Buttle " ?</tokentext>
<sentencetext>And thus was a "Mr. Tuttle" overcharged for information retrieval.
Or was that "Mr. Buttle"?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202449</id>
	<title>Re:Inspired!</title>
	<author>Anonymous</author>
	<datestamp>1244027640000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>as normal on slashdot little to no experience in the matter not having lived in the UK and unaware of all the statistics maybe they shouldn't seize so many computers seems along the lines of in California a solution for dealing with prison over crowding being to not arrest so many people.  but most importantly remember jack of all trades master of none just make sure you have the right people to determine what to seize as well as complimenting that with the proper number of people to examine the evidence and let the regular old cop do his job while you do yours.</p></htmltext>
<tokenext>as normal on slashdot little to no experience in the matter not having lived in the UK and unaware of all the statistics maybe they should n't seize so many computers seems along the lines of in California a solution for dealing with prison over crowding being to not arrest so many people .
but most importantly remember jack of all trades master of none just make sure you have the right people to determine what to seize as well as complimenting that with the proper number of people to examine the evidence and let the regular old cop do his job while you do yours .</tokentext>
<sentencetext>as normal on slashdot little to no experience in the matter not having lived in the UK and unaware of all the statistics maybe they shouldn't seize so many computers seems along the lines of in California a solution for dealing with prison over crowding being to not arrest so many people.
but most importantly remember jack of all trades master of none just make sure you have the right people to determine what to seize as well as complimenting that with the proper number of people to examine the evidence and let the regular old cop do his job while you do yours.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200813</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201183</id>
	<title>Cause and effect</title>
	<author>Anonymous</author>
	<datestamp>1244023320000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>1</modscore>
	<htmltext><p>In the old days, everything ran on separate ports.  Remote control had a port, file transfer had a port, Chat had a port.</p><p>Cause:  Firewalls began blocking those ports to block the applications so users couldn't use them.</p><p>Effect:  Today, this all runs on port 443.  GotoMyPC, file sharing sites, most chat programs work on port 443.</p><p>The effect of this would be for users to move their data encrypted and online, into some other country that they can trust will not divulge the information when asked.  Launch my client, provide my key, and map a drive over 443 to my data.</p><p>You take my PC, the data is not there.   You break into my home and plug into my PC when I'm gone, the data's not going to be available.   You somehow get the data from the host you have to spend a long time brute forcing the password.</p><p>Of course, they will then load up a fake root key onto my PC and man in the middle attack me, but one step at a time..</p></htmltext>
<tokenext>In the old days , everything ran on separate ports .
Remote control had a port , file transfer had a port , Chat had a port.Cause : Firewalls began blocking those ports to block the applications so users could n't use them.Effect : Today , this all runs on port 443 .
GotoMyPC , file sharing sites , most chat programs work on port 443.The effect of this would be for users to move their data encrypted and online , into some other country that they can trust will not divulge the information when asked .
Launch my client , provide my key , and map a drive over 443 to my data.You take my PC , the data is not there .
You break into my home and plug into my PC when I 'm gone , the data 's not going to be available .
You somehow get the data from the host you have to spend a long time brute forcing the password.Of course , they will then load up a fake root key onto my PC and man in the middle attack me , but one step at a time. .</tokentext>
<sentencetext>In the old days, everything ran on separate ports.
Remote control had a port, file transfer had a port, Chat had a port.Cause:  Firewalls began blocking those ports to block the applications so users couldn't use them.Effect:  Today, this all runs on port 443.
GotoMyPC, file sharing sites, most chat programs work on port 443.The effect of this would be for users to move their data encrypted and online, into some other country that they can trust will not divulge the information when asked.
Launch my client, provide my key, and map a drive over 443 to my data.You take my PC, the data is not there.
You break into my home and plug into my PC when I'm gone, the data's not going to be available.
You somehow get the data from the host you have to spend a long time brute forcing the password.Of course, they will then load up a fake root key onto my PC and man in the middle attack me, but one step at a time..</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202809</id>
	<title>Do us a favor...</title>
	<author>Anonymous</author>
	<datestamp>1244029080000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>How about a USB key set up to detect and remove zombies / open-relay / spam junk / malware, FTP install system updates and security patches, and do general system hardening on my friends &amp; co-workers PCs in a hands-free fashion? Just plug in, let it zap the badness away while I have a coffee, then charge them $50 for the housecall.</p></htmltext>
<tokenext>How about a USB key set up to detect and remove zombies / open-relay / spam junk / malware , FTP install system updates and security patches , and do general system hardening on my friends &amp; co-workers PCs in a hands-free fashion ?
Just plug in , let it zap the badness away while I have a coffee , then charge them $ 50 for the housecall .</tokentext>
<sentencetext>How about a USB key set up to detect and remove zombies / open-relay / spam junk / malware, FTP install system updates and security patches, and do general system hardening on my friends &amp; co-workers PCs in a hands-free fashion?
Just plug in, let it zap the badness away while I have a coffee, then charge them $50 for the housecall.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207061</id>
	<title>Re:First among other things...</title>
	<author>jonbryce</author>
	<datestamp>1244112660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>They boot up the machine using a live CD image, which may not always work of course.  So what they need is software for Macs, PCs and various types of computers with non-intel compatible CPUs, and support for all the different file systems out there.</p><p>I guess if this thing can manage most of the computers they find, then anything obscure can still go to the forensics lab, which would now have a much faster turnaround time because of the smaller workload.</p></htmltext>
<tokenext>They boot up the machine using a live CD image , which may not always work of course .
So what they need is software for Macs , PCs and various types of computers with non-intel compatible CPUs , and support for all the different file systems out there.I guess if this thing can manage most of the computers they find , then anything obscure can still go to the forensics lab , which would now have a much faster turnaround time because of the smaller workload .</tokentext>
<sentencetext>They boot up the machine using a live CD image, which may not always work of course.
So what they need is software for Macs, PCs and various types of computers with non-intel compatible CPUs, and support for all the different file systems out there.I guess if this thing can manage most of the computers they find, then anything obscure can still go to the forensics lab, which would now have a much faster turnaround time because of the smaller workload.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203031</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202253</id>
	<title>Re:Should be easy in the UK.</title>
	<author>91degrees</author>
	<datestamp>1244026920000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Yes, but it's a little more complicated than "tell us the password or we arrest you".  They have to apply to a court.  Once you're going to that level of difficulty, the USB device seems substantially less plug and play even if it's just a rubber stamp.</htmltext>
<tokenext>Yes , but it 's a little more complicated than " tell us the password or we arrest you " .
They have to apply to a court .
Once you 're going to that level of difficulty , the USB device seems substantially less plug and play even if it 's just a rubber stamp .</tokentext>
<sentencetext>Yes, but it's a little more complicated than "tell us the password or we arrest you".
They have to apply to a court.
Once you're going to that level of difficulty, the USB device seems substantially less plug and play even if it's just a rubber stamp.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201553</id>
	<title>Re:O RLY?</title>
	<author>fluch</author>
	<datestamp>1244024640000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Even under danger of being redundant:</p><p>My Linux laptop runs under full disc encryption (except the<nobr> <wbr></nobr>/boot partition). And under Mac OS X I use a file vault. External drives and USB sticks are encrypted using Truecrypt. So, yes, also here a big "O RLY?"<nobr> <wbr></nobr>;-)</p></htmltext>
<tokenext>Even under danger of being redundant : My Linux laptop runs under full disc encryption ( except the /boot partition ) .
And under Mac OS X I use a file vault .
External drives and USB sticks are encrypted using Truecrypt .
So , yes , also here a big " O RLY ?
" ; - )</tokentext>
<sentencetext>Even under danger of being redundant:My Linux laptop runs under full disc encryption (except the /boot partition).
And under Mac OS X I use a file vault.
External drives and USB sticks are encrypted using Truecrypt.
So, yes, also here a big "O RLY?
" ;-)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200845</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200697</id>
	<title>Re:and the companion product....</title>
	<author>dranga</author>
	<datestamp>1244021520000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p>Just rewire your USB ports to run at 120v.  And label it USB120 so you can point back at them for not reading when they try to charge you with damaging their equipment.</p></htmltext>
<tokenext>Just rewire your USB ports to run at 120v .
And label it USB120 so you can point back at them for not reading when they try to charge you with damaging their equipment .</tokentext>
<sentencetext>Just rewire your USB ports to run at 120v.
And label it USB120 so you can point back at them for not reading when they try to charge you with damaging their equipment.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200623</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200655</id>
	<title>Keep dreaming you red coats...</title>
	<author>Anonymous</author>
	<datestamp>1244021400000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>something like this can easily be averted. VMs, incompatible OSs, dual boots, jailbroken iPod Touchs, root kits, etc.. It's like The Great Firewall of China, sure it looks good on paper, but anyone knowledgable enough can break it.</p></htmltext>
<tokenext>something like this can easily be averted .
VMs , incompatible OSs , dual boots , jailbroken iPod Touchs , root kits , etc.. It 's like The Great Firewall of China , sure it looks good on paper , but anyone knowledgable enough can break it .</tokentext>
<sentencetext>something like this can easily be averted.
VMs, incompatible OSs, dual boots, jailbroken iPod Touchs, root kits, etc.. It's like The Great Firewall of China, sure it looks good on paper, but anyone knowledgable enough can break it.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203031</id>
	<title>Re:First among other things...</title>
	<author>PaulMacGuysScott</author>
	<datestamp>1244030040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>This would not work.  First the USB device would have to loaded with software for every operating system they would encounter.  Even if you choose not to use Encryption which is an easy way around.  Someone will design a root kit that allows someone to hide data in a way the device can't find and only by doing some secret sequence of events reveal the data.  Or just keep all illegal activities on a thumb drive or other external storage device.

This is a case of someone who doesn't understand technology having a bad idea and no one with enough technical knowledge around those people to tell them it is a bad idea and will never work.  That is just from a technical perspective.  Civil Liberties and law are another issue entirely.  In the US you couldn't force people to turn over their computer for search without a warrant to do so.

I bet this falls off the news in a few days and will be forgotten about for years to come.</htmltext>
<tokenext>This would not work .
First the USB device would have to loaded with software for every operating system they would encounter .
Even if you choose not to use Encryption which is an easy way around .
Someone will design a root kit that allows someone to hide data in a way the device ca n't find and only by doing some secret sequence of events reveal the data .
Or just keep all illegal activities on a thumb drive or other external storage device .
This is a case of someone who does n't understand technology having a bad idea and no one with enough technical knowledge around those people to tell them it is a bad idea and will never work .
That is just from a technical perspective .
Civil Liberties and law are another issue entirely .
In the US you could n't force people to turn over their computer for search without a warrant to do so .
I bet this falls off the news in a few days and will be forgotten about for years to come .</tokentext>
<sentencetext>This would not work.
First the USB device would have to loaded with software for every operating system they would encounter.
Even if you choose not to use Encryption which is an easy way around.
Someone will design a root kit that allows someone to hide data in a way the device can't find and only by doing some secret sequence of events reveal the data.
Or just keep all illegal activities on a thumb drive or other external storage device.
This is a case of someone who doesn't understand technology having a bad idea and no one with enough technical knowledge around those people to tell them it is a bad idea and will never work.
That is just from a technical perspective.
Civil Liberties and law are another issue entirely.
In the US you couldn't force people to turn over their computer for search without a warrant to do so.
I bet this falls off the news in a few days and will be forgotten about for years to come.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200507</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207237</id>
	<title>Re:Why not....</title>
	<author>Jaysyn</author>
	<datestamp>1244115360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>I've noticed that EU countries tend to ignore or bend them meaning of directives when they inconvenience them.  So best of luck with that.</p></htmltext>
<tokenext>I 've noticed that EU countries tend to ignore or bend them meaning of directives when they inconvenience them .
So best of luck with that .</tokentext>
<sentencetext>I've noticed that EU countries tend to ignore or bend them meaning of directives when they inconvenience them.
So best of luck with that.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200869</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201337</id>
	<title>Cracking the 256-bit encryption is the easy part</title>
	<author>Joce640k</author>
	<datestamp>1244023860000</datestamp>
	<modclass>Funny</modclass>
	<modscore>4</modscore>
	<htmltext><p>The real problem is writing the OOXML parser.</p></htmltext>
<tokenext>The real problem is writing the OOXML parser .</tokentext>
<sentencetext>The real problem is writing the OOXML parser.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203077</id>
	<title>Re:USB?</title>
	<author>Anonymous</author>
	<datestamp>1244030220000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Well you have access to every file that the logged in user has access to. remember usb keyboards? there is nothing that prevents a properly modified usb stick to act as a keyboard, sending the keystrokes a properly educated cyber copper would have to make (executing a trojan). might seem like a real challenge from a software engineers POV to craft it properly for all those different OSs (or desktop environments if youre the linux kind of person), but theoretically it could be done. has been done, i guess. watch out for usb stick giveaways on conferences =).</p></htmltext>
<tokenext>Well you have access to every file that the logged in user has access to .
remember usb keyboards ?
there is nothing that prevents a properly modified usb stick to act as a keyboard , sending the keystrokes a properly educated cyber copper would have to make ( executing a trojan ) .
might seem like a real challenge from a software engineers POV to craft it properly for all those different OSs ( or desktop environments if youre the linux kind of person ) , but theoretically it could be done .
has been done , i guess .
watch out for usb stick giveaways on conferences = ) .</tokentext>
<sentencetext>Well you have access to every file that the logged in user has access to.
remember usb keyboards?
there is nothing that prevents a properly modified usb stick to act as a keyboard, sending the keystrokes a properly educated cyber copper would have to make (executing a trojan).
might seem like a real challenge from a software engineers POV to craft it properly for all those different OSs (or desktop environments if youre the linux kind of person), but theoretically it could be done.
has been done, i guess.
watch out for usb stick giveaways on conferences =).</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201485</id>
	<title>Re:Should be easy in the UK.</title>
	<author>rcamans</author>
	<datestamp>1244024340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Wouldn't it be easier to load millions of files that give false positives, embarrassingly? When you open up the compressed pic, it is an innocent, hilarious comic cop or something? That would really slow down the software, as it would have to look at every file, and then spend a significant amount of time reporting it as bad, logging it, saving it off to the relatively small USB drive (you need gigabytes of these bogus files). That would really piss off the judge. People should try to get their baited honeypot netbooks confiscated by the cops, flood their system with BS. Upset the judge.</p></htmltext>
<tokenext>Would n't it be easier to load millions of files that give false positives , embarrassingly ?
When you open up the compressed pic , it is an innocent , hilarious comic cop or something ?
That would really slow down the software , as it would have to look at every file , and then spend a significant amount of time reporting it as bad , logging it , saving it off to the relatively small USB drive ( you need gigabytes of these bogus files ) .
That would really piss off the judge .
People should try to get their baited honeypot netbooks confiscated by the cops , flood their system with BS .
Upset the judge .</tokentext>
<sentencetext>Wouldn't it be easier to load millions of files that give false positives, embarrassingly?
When you open up the compressed pic, it is an innocent, hilarious comic cop or something?
That would really slow down the software, as it would have to look at every file, and then spend a significant amount of time reporting it as bad, logging it, saving it off to the relatively small USB drive (you need gigabytes of these bogus files).
That would really piss off the judge.
People should try to get their baited honeypot netbooks confiscated by the cops, flood their system with BS.
Upset the judge.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201401</id>
	<title>USB spy devices</title>
	<author>Anonymous</author>
	<datestamp>1244024040000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I was once the sysadmin for a public high school. The Web design teacher was an idiot who thought she was an independent entity from the school district. She once called me screaming, so the assistant sysadmin went up there to check on it. She held up the wireless presenter's Bluetooth dongle and screamed "The district is spying on me!"; he had to calmly point out to her that it was actually a Bluetooth dongle for the wireless presenter that she had bought not too long ago.</p><p>I considered telling her "We don't need that to spy on you. We can watch your screen with Altiris, examine your home directory at \\server\users\username, and even your local hard drive at \\computername\c$". Maybe I should have said that--I'd love to see her wrap her workstation with tinfoil.</p></htmltext>
<tokenext>I was once the sysadmin for a public high school .
The Web design teacher was an idiot who thought she was an independent entity from the school district .
She once called me screaming , so the assistant sysadmin went up there to check on it .
She held up the wireless presenter 's Bluetooth dongle and screamed " The district is spying on me !
" ; he had to calmly point out to her that it was actually a Bluetooth dongle for the wireless presenter that she had bought not too long ago.I considered telling her " We do n't need that to spy on you .
We can watch your screen with Altiris , examine your home directory at \ \ server \ users \ username , and even your local hard drive at \ \ computername \ c $ " .
Maybe I should have said that--I 'd love to see her wrap her workstation with tinfoil .</tokentext>
<sentencetext>I was once the sysadmin for a public high school.
The Web design teacher was an idiot who thought she was an independent entity from the school district.
She once called me screaming, so the assistant sysadmin went up there to check on it.
She held up the wireless presenter's Bluetooth dongle and screamed "The district is spying on me!
"; he had to calmly point out to her that it was actually a Bluetooth dongle for the wireless presenter that she had bought not too long ago.I considered telling her "We don't need that to spy on you.
We can watch your screen with Altiris, examine your home directory at \\server\users\username, and even your local hard drive at \\computername\c$".
Maybe I should have said that--I'd love to see her wrap her workstation with tinfoil.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207711</id>
	<title>Re:First among other things...</title>
	<author>Drakkenmensch</author>
	<datestamp>1244121060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>I bet this falls off the news in a few days and will be forgotten about for years to come.</p></div><p> I'm pretty sure a story like this was already slashdotted about two years ago, more or less.</p></div>
	</htmltext>
<tokenext>I bet this falls off the news in a few days and will be forgotten about for years to come .
I 'm pretty sure a story like this was already slashdotted about two years ago , more or less .</tokentext>
<sentencetext>I bet this falls off the news in a few days and will be forgotten about for years to come.
I'm pretty sure a story like this was already slashdotted about two years ago, more or less.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203031</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200781</id>
	<title>Microsoft already provides this</title>
	<author>Anonymous</author>
	<datestamp>1244021820000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>5</modscore>
	<htmltext><p>It's called <a href="http://www.microsoft.com/industry/government/news/cofee\_faq.mspx" title="microsoft.com" rel="nofollow">COFEE</a> [microsoft.com] </p><blockquote><div><p>Q.What is COFEE?</p><p>A.COFEE (Computer Online Forensic Evidence Extractor) is a tool that helps simplify the very complex problem of gathering "live" computer evidence of cybercrime. It utilizes common forensics tools to aid officers at the scene in gathering important live evidence with a single USB device. It also provides reports in a simple format for later interpretation by computer experts, or as supportive evidence for computer investigations. This means that first-responder officers on the scene of a crime don't have to be computer forensic experts to capture live data for later analysis and that this critical information does not have to be lost once a computer is shut down to be taken for a traditional offline forensic analysis.</p></div></blockquote><p>Cops got even got their own web portal courtesy of Microsoft.</p></div>
	</htmltext>
<tokenext>It 's called COFEE [ microsoft.com ] Q.What is COFEE ? A.COFEE ( Computer Online Forensic Evidence Extractor ) is a tool that helps simplify the very complex problem of gathering " live " computer evidence of cybercrime .
It utilizes common forensics tools to aid officers at the scene in gathering important live evidence with a single USB device .
It also provides reports in a simple format for later interpretation by computer experts , or as supportive evidence for computer investigations .
This means that first-responder officers on the scene of a crime do n't have to be computer forensic experts to capture live data for later analysis and that this critical information does not have to be lost once a computer is shut down to be taken for a traditional offline forensic analysis.Cops got even got their own web portal courtesy of Microsoft .</tokentext>
<sentencetext>It's called COFEE [microsoft.com] Q.What is COFEE?A.COFEE (Computer Online Forensic Evidence Extractor) is a tool that helps simplify the very complex problem of gathering "live" computer evidence of cybercrime.
It utilizes common forensics tools to aid officers at the scene in gathering important live evidence with a single USB device.
It also provides reports in a simple format for later interpretation by computer experts, or as supportive evidence for computer investigations.
This means that first-responder officers on the scene of a crime don't have to be computer forensic experts to capture live data for later analysis and that this critical information does not have to be lost once a computer is shut down to be taken for a traditional offline forensic analysis.Cops got even got their own web portal courtesy of Microsoft.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205687</id>
	<title>Zap 'em</title>
	<author>mbstone</author>
	<datestamp>1244049780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>What I want is a gizmo inside my PC that will detect rogue spy-USB devices and give 'em the ol' Tesla....</p></htmltext>
<tokenext>What I want is a gizmo inside my PC that will detect rogue spy-USB devices and give 'em the ol ' Tesla... .</tokentext>
<sentencetext>What I want is a gizmo inside my PC that will detect rogue spy-USB devices and give 'em the ol' Tesla....</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205127</id>
	<title>Re:Should be easy in the UK.</title>
	<author>timmarhy</author>
	<datestamp>1244043720000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>it's called a duress key, your encryption scheme is flawed if it doesn't have one so change.</htmltext>
<tokenext>it 's called a duress key , your encryption scheme is flawed if it does n't have one so change .</tokentext>
<sentencetext>it's called a duress key, your encryption scheme is flawed if it doesn't have one so change.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200619</id>
	<title>Sounds like crazy talk.</title>
	<author>Garbad Ropedink</author>
	<datestamp>1244021280000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>2</modscore>
	<htmltext><p>I'm not much in the ways of encryption, but I assume if your computer's encrypted it'll be pretty difficult for this thing to work through the system, if not impossible.<br>Sounds like the cops just want a usb key that has a light that comes on when the law's been broken.</p><p>Mainstream computer illiteracy at work.</p></htmltext>
<tokenext>I 'm not much in the ways of encryption , but I assume if your computer 's encrypted it 'll be pretty difficult for this thing to work through the system , if not impossible.Sounds like the cops just want a usb key that has a light that comes on when the law 's been broken.Mainstream computer illiteracy at work .</tokentext>
<sentencetext>I'm not much in the ways of encryption, but I assume if your computer's encrypted it'll be pretty difficult for this thing to work through the system, if not impossible.Sounds like the cops just want a usb key that has a light that comes on when the law's been broken.Mainstream computer illiteracy at work.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205285</id>
	<title>Re:Should be easy in the UK.</title>
	<author>Tuoqui</author>
	<datestamp>1244045160000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Sounds like all they need to do is surrender AN encryption key. They dont need to surrender ALL encryption keys. Hence Hidden Volumes would be a great idea.</p></htmltext>
<tokenext>Sounds like all they need to do is surrender AN encryption key .
They dont need to surrender ALL encryption keys .
Hence Hidden Volumes would be a great idea .</tokentext>
<sentencetext>Sounds like all they need to do is surrender AN encryption key.
They dont need to surrender ALL encryption keys.
Hence Hidden Volumes would be a great idea.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28212937</id>
	<title>use a Fake USB slot</title>
	<author>Anonymous</author>
	<datestamp>1244144160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p> which gives a very bad shock when someone plugs in something.</p></htmltext>
<tokenext>which gives a very bad shock when someone plugs in something .</tokentext>
<sentencetext> which gives a very bad shock when someone plugs in something.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205557</id>
	<title>Re:First among other things...</title>
	<author>Sillygates</author>
	<datestamp>1244048280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Oh, you can already do that!<br>
<a href="http://www.dtecnetusa.com/intro.html" title="dtecnetusa.com">http://www.dtecnetusa.com/intro.html</a> [dtecnetusa.com] <br>
<br>
Linked from: <a href="http://www.respectcopyrights.org/faqs.html" title="respectcopyrights.org">http://www.respectcopyrights.org/faqs.html</a> [respectcopyrights.org]</htmltext>
<tokenext>Oh , you can already do that !
http : //www.dtecnetusa.com/intro.html [ dtecnetusa.com ] Linked from : http : //www.respectcopyrights.org/faqs.html [ respectcopyrights.org ]</tokentext>
<sentencetext>Oh, you can already do that!
http://www.dtecnetusa.com/intro.html [dtecnetusa.com] 

Linked from: http://www.respectcopyrights.org/faqs.html [respectcopyrights.org]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200507</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201449</id>
	<title>Re:Great...</title>
	<author>shadowknot</author>
	<datestamp>1244024220000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>3</modscore>
	<htmltext><p><div class="quote"><p>
Officer: I pushed the button, and the computer told me to arrest him.</p></div><p>So they'll be just like cell phone analysts then, ha! (Sorry, that's a digital forensics joke).  But seriously that is an accurate assessment.  The handful of times I have been to court to give evidence involving an analysis I have performed they have asked me simple but semi-well researched questions.  Most officers I speak to can barely spell let alone describe how a device they have no idea about discovered illegal material on a computer they don't know how to use.  I do, however, suspect that this device, if ever rolled-out, would be used to "preview" the devices on-site and if it beeped and flashed a green light at them they'd send it off for full analysis.</p></div>
	</htmltext>
<tokenext>Officer : I pushed the button , and the computer told me to arrest him.So they 'll be just like cell phone analysts then , ha !
( Sorry , that 's a digital forensics joke ) .
But seriously that is an accurate assessment .
The handful of times I have been to court to give evidence involving an analysis I have performed they have asked me simple but semi-well researched questions .
Most officers I speak to can barely spell let alone describe how a device they have no idea about discovered illegal material on a computer they do n't know how to use .
I do , however , suspect that this device , if ever rolled-out , would be used to " preview " the devices on-site and if it beeped and flashed a green light at them they 'd send it off for full analysis .</tokentext>
<sentencetext>
Officer: I pushed the button, and the computer told me to arrest him.So they'll be just like cell phone analysts then, ha!
(Sorry, that's a digital forensics joke).
But seriously that is an accurate assessment.
The handful of times I have been to court to give evidence involving an analysis I have performed they have asked me simple but semi-well researched questions.
Most officers I speak to can barely spell let alone describe how a device they have no idea about discovered illegal material on a computer they don't know how to use.
I do, however, suspect that this device, if ever rolled-out, would be used to "preview" the devices on-site and if it beeped and flashed a green light at them they'd send it off for full analysis.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</id>
	<title>Great...</title>
	<author>Chabo</author>
	<datestamp>1244021040000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>5</modscore>
	<htmltext><p>Now instead of having trained forensic experts, we'll have common beat cops searching your computer.</p><p>Attorney: How do you know he had illegal material on his computer?<br>Officer: I pushed the button, and the computer told me to arrest him.</p></htmltext>
<tokenext>Now instead of having trained forensic experts , we 'll have common beat cops searching your computer.Attorney : How do you know he had illegal material on his computer ? Officer : I pushed the button , and the computer told me to arrest him .</tokentext>
<sentencetext>Now instead of having trained forensic experts, we'll have common beat cops searching your computer.Attorney: How do you know he had illegal material on his computer?Officer: I pushed the button, and the computer told me to arrest him.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200905</id>
	<title>Re:Should be easy in the UK.</title>
	<author>blueg3</author>
	<datestamp>1244022240000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>It's easy in the U.S., too, just not as useful. If the TrueCrypt drive is mounted, just search it. If it's not, maybe you can say, "Hey, they have a TrueCrypt drive", but that's about it.</p></htmltext>
<tokenext>It 's easy in the U.S. , too , just not as useful .
If the TrueCrypt drive is mounted , just search it .
If it 's not , maybe you can say , " Hey , they have a TrueCrypt drive " , but that 's about it .</tokentext>
<sentencetext>It's easy in the U.S., too, just not as useful.
If the TrueCrypt drive is mounted, just search it.
If it's not, maybe you can say, "Hey, they have a TrueCrypt drive", but that's about it.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201769</id>
	<title>Re:Inspired!</title>
	<author>fluffernutter</author>
	<datestamp>1244025360000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Then this begs a different question.. The UK police are seeking out a USB device.. but it sounds like they may have many pre-USB systems to search!

Furthermore, why not just automate imaging the drive and storing in some data vault somewhere with some tamper-proof security measures in place.  Instead of a hardware device, you could just have software on a sizable server that scans the image and detects any 'bad stuff'.  Seems much more efficient to do it this way.</htmltext>
<tokenext>Then this begs a different question.. The UK police are seeking out a USB device.. but it sounds like they may have many pre-USB systems to search !
Furthermore , why not just automate imaging the drive and storing in some data vault somewhere with some tamper-proof security measures in place .
Instead of a hardware device , you could just have software on a sizable server that scans the image and detects any 'bad stuff' .
Seems much more efficient to do it this way .</tokentext>
<sentencetext>Then this begs a different question.. The UK police are seeking out a USB device.. but it sounds like they may have many pre-USB systems to search!
Furthermore, why not just automate imaging the drive and storing in some data vault somewhere with some tamper-proof security measures in place.
Instead of a hardware device, you could just have software on a sizable server that scans the image and detects any 'bad stuff'.
Seems much more efficient to do it this way.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200813</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203713</id>
	<title>Don't keep anything on your drive</title>
	<author>selven</author>
	<datestamp>1244033040000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Keep it all on various web hosting services with encryption and steganography, and use a ubuntu livecd to access it, so no permanent evidence that you have any online data ever exists. For bonus points, keep a folder on your actual hard drive called "Child Porn" and fill it with screenshots of naked children in Disney movies.</htmltext>
<tokenext>Keep it all on various web hosting services with encryption and steganography , and use a ubuntu livecd to access it , so no permanent evidence that you have any online data ever exists .
For bonus points , keep a folder on your actual hard drive called " Child Porn " and fill it with screenshots of naked children in Disney movies .</tokentext>
<sentencetext>Keep it all on various web hosting services with encryption and steganography, and use a ubuntu livecd to access it, so no permanent evidence that you have any online data ever exists.
For bonus points, keep a folder on your actual hard drive called "Child Porn" and fill it with screenshots of naked children in Disney movies.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204673</id>
	<title>Holy S#tt</title>
	<author>Burz</author>
	<datestamp>1244039760000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>MS is advertising that Windows has a backdoor now??!</p><p>I really don't see how else <i>'plug in USB device and collect live data'</i> can be interpreted.</p><p>Here is my <i>urgent</i> advice for Linux users:<br><tt>sudo apt-get remove w32codecs w64codecs silverlight msttcorefonts<br></tt></p></htmltext>
<tokenext>MS is advertising that Windows has a backdoor now ? ?
! I really do n't see how else 'plug in USB device and collect live data ' can be interpreted.Here is my urgent advice for Linux users : sudo apt-get remove w32codecs w64codecs silverlight msttcorefonts</tokentext>
<sentencetext>MS is advertising that Windows has a backdoor now??
!I really don't see how else 'plug in USB device and collect live data' can be interpreted.Here is my urgent advice for Linux users:sudo apt-get remove w32codecs w64codecs silverlight msttcorefonts</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200781</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200683</id>
	<title>Old and busted: Guns, New and busted: Thumbdrives</title>
	<author>Anonymous</author>
	<datestamp>1244021520000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I'd feel real safe walking the streets of Manchester knowing the police had USB devices to stop the criminals.</p><p>NOT.</p></htmltext>
<tokenext>I 'd feel real safe walking the streets of Manchester knowing the police had USB devices to stop the criminals.NOT .</tokentext>
<sentencetext>I'd feel real safe walking the streets of Manchester knowing the police had USB devices to stop the criminals.NOT.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200549</id>
	<title>Perfectly Legitimate</title>
	<author>marco13185</author>
	<datestamp>1244021100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>There's nothing wrong with the government using whatever technology they has at their disposal to search computers they have legally seized.  That they haven't been using such technology up to now is baffling.</p></htmltext>
<tokenext>There 's nothing wrong with the government using whatever technology they has at their disposal to search computers they have legally seized .
That they have n't been using such technology up to now is baffling .</tokentext>
<sentencetext>There's nothing wrong with the government using whatever technology they has at their disposal to search computers they have legally seized.
That they haven't been using such technology up to now is baffling.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204325</id>
	<title>Re:Hmm</title>
	<author>Anonymous</author>
	<datestamp>1244037000000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>it's taking them a long time to work up a GUI interface in visual basic to track those IP addresses of the CP collectors</p></htmltext>
<tokenext>it 's taking them a long time to work up a GUI interface in visual basic to track those IP addresses of the CP collectors</tokentext>
<sentencetext>it's taking them a long time to work up a GUI interface in visual basic to track those IP addresses of the CP collectors</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200607</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206727</id>
	<title>Re:First among other things...</title>
	<author>Anonymous</author>
	<datestamp>1244107920000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>You should be moded informative, not funny!</p></htmltext>
<tokenext>You should be moded informative , not funny !</tokentext>
<sentencetext>You should be moded informative, not funny!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200507</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207103</id>
	<title>Re:Great...</title>
	<author>\_.-*'Se La CeY'*-.\_</author>
	<datestamp>1244113380000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Not only will you have beat cops trying to get you with a stupid device they think is evidence, but you will also have yet another coporation defining what is right and wrong</htmltext>
<tokenext>Not only will you have beat cops trying to get you with a stupid device they think is evidence , but you will also have yet another coporation defining what is right and wrong</tokentext>
<sentencetext>Not only will you have beat cops trying to get you with a stupid device they think is evidence, but you will also have yet another coporation defining what is right and wrong</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202151</id>
	<title>Re:Great...</title>
	<author>Anonymous</author>
	<datestamp>1244026620000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Scan complete.<br>Arrest the owner of the computer on the following charges:</p><p>- Pornography on hard drive involves girls that look younger than 18<br>- Torrent software is installed<br>- Encryption software is installed<br>- Resisting arrest</p><p>Thank you for using USBjje (Judge/Jury/Executioner)</p></htmltext>
<tokenext>Scan complete.Arrest the owner of the computer on the following charges : - Pornography on hard drive involves girls that look younger than 18- Torrent software is installed- Encryption software is installed- Resisting arrestThank you for using USBjje ( Judge/Jury/Executioner )</tokentext>
<sentencetext>Scan complete.Arrest the owner of the computer on the following charges:- Pornography on hard drive involves girls that look younger than 18- Torrent software is installed- Encryption software is installed- Resisting arrestThank you for using USBjje (Judge/Jury/Executioner)</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206805</id>
	<title>Re:Yet another reason to move to Linux</title>
	<author>jimicus</author>
	<datestamp>1244108940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>...as if there weren't enough already.</p><p>You can bet this thing will entirely operate on the presumption that every PC runs windows.</p></div><p>You are assuming that Linux is some sooper sekrit thing that only you and a few others know about - and that nobody in the IT forensics business is even remotely aware that it exists, much less that it uses different filesystems.</p><p>Hint:  The IT forensics trade is mostly comprised of significantly more tech-savvy people than your average police station.</p></div>
	</htmltext>
<tokenext>...as if there were n't enough already.You can bet this thing will entirely operate on the presumption that every PC runs windows.You are assuming that Linux is some sooper sekrit thing that only you and a few others know about - and that nobody in the IT forensics business is even remotely aware that it exists , much less that it uses different filesystems.Hint : The IT forensics trade is mostly comprised of significantly more tech-savvy people than your average police station .</tokentext>
<sentencetext>...as if there weren't enough already.You can bet this thing will entirely operate on the presumption that every PC runs windows.You are assuming that Linux is some sooper sekrit thing that only you and a few others know about - and that nobody in the IT forensics business is even remotely aware that it exists, much less that it uses different filesystems.Hint:  The IT forensics trade is mostly comprised of significantly more tech-savvy people than your average police station.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203261</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200993</id>
	<title>Re:Great...</title>
	<author>TinBromide</author>
	<datestamp>1244022600000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Its not quite like that, but there have been USB forensic incident response sticks for a while, although the oldest ones I'm aware have primarily been used by parole officers to see if their parolees have been <a href="http://www.forensics-intl.com/nta.html" title="forensics-intl.com">surfing porn</a> [forensics-intl.com]. If the NTA scan turns up positive, they then sieze the computer and investigate further. <br> <br>There are also a few more sophisticated ones that I don't have bookmarked on this computer. I've used a few my self, like there's a rapid response stick that can be used for mass computer identification. I.E. walk into a corporate environment and ID all computers that were logged into by Joe S., Pull the IE/Firefox browsing history, documents accessed by him on that computer, and other assorted usage items. <br> <br>These stick's aren't going to provide final evidence, but they will help prevent having all the computers in a corporate environment from being seized and analyzed, which will prevent them from having to do a full forensic workup on your computer if a person of interest has never logged into your system.</htmltext>
<tokenext>Its not quite like that , but there have been USB forensic incident response sticks for a while , although the oldest ones I 'm aware have primarily been used by parole officers to see if their parolees have been surfing porn [ forensics-intl.com ] .
If the NTA scan turns up positive , they then sieze the computer and investigate further .
There are also a few more sophisticated ones that I do n't have bookmarked on this computer .
I 've used a few my self , like there 's a rapid response stick that can be used for mass computer identification .
I.E. walk into a corporate environment and ID all computers that were logged into by Joe S. , Pull the IE/Firefox browsing history , documents accessed by him on that computer , and other assorted usage items .
These stick 's are n't going to provide final evidence , but they will help prevent having all the computers in a corporate environment from being seized and analyzed , which will prevent them from having to do a full forensic workup on your computer if a person of interest has never logged into your system .</tokentext>
<sentencetext>Its not quite like that, but there have been USB forensic incident response sticks for a while, although the oldest ones I'm aware have primarily been used by parole officers to see if their parolees have been surfing porn [forensics-intl.com].
If the NTA scan turns up positive, they then sieze the computer and investigate further.
There are also a few more sophisticated ones that I don't have bookmarked on this computer.
I've used a few my self, like there's a rapid response stick that can be used for mass computer identification.
I.E. walk into a corporate environment and ID all computers that were logged into by Joe S., Pull the IE/Firefox browsing history, documents accessed by him on that computer, and other assorted usage items.
These stick's aren't going to provide final evidence, but they will help prevent having all the computers in a corporate environment from being seized and analyzed, which will prevent them from having to do a full forensic workup on your computer if a person of interest has never logged into your system.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201775</id>
	<title>Re:USB?</title>
	<author>Anonymous</author>
	<datestamp>1244025360000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext>exactly thats the problem...
this is an impossible task thought up by an idiot who has absolutly no knowledge about how all this works!</htmltext>
<tokenext>exactly thats the problem.. . this is an impossible task thought up by an idiot who has absolutly no knowledge about how all this works !</tokentext>
<sentencetext>exactly thats the problem...
this is an impossible task thought up by an idiot who has absolutly no knowledge about how all this works!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201709</id>
	<title>Re:Great...</title>
	<author>Keichann</author>
	<datestamp>1244025120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>Real computer forensics involves getting the computer powered down, removing the disk, setting it up in a test jig with write protect enabled, and reading the complete image from the disk onto a sterile environment for analysis.</p></div><p>That was true.. in 1998 (the fact that it's still such a pervasive misconception is a seperate problem).  We now know there's a wide variety of critical information that isn't available when a computer's powered off - if a (trojan) malware object was present on the drive at capture, with a purely offline view can you prove whether it was loaded into the OS when the evidence was seized?  How about open file handles/network connections?  Encryption keys?</p><p><div class="quote"><p>If he has interfered with the computer in any way by plugging in a USB key, then the evidence is contaminated.</p></div><p>The article probably oversimplifies, simple USB keys that just come pre-loaded with software to search drives aren't that interesting anymore, the idea is probably close to Tribble or something similar.  Not that there aren't problems with those kinds of devices... <a href="http://lollobox.org/lollobox/raw-attachment/wiki/TheProject/DoesntProtectFrom/bh-dc-07-Rutkowska-up.pdf" title="lollobox.org" rel="nofollow">Rutkowska, 2007 (pdf)</a> [lollobox.org]</p></div>
	</htmltext>
<tokenext>Real computer forensics involves getting the computer powered down , removing the disk , setting it up in a test jig with write protect enabled , and reading the complete image from the disk onto a sterile environment for analysis.That was true.. in 1998 ( the fact that it 's still such a pervasive misconception is a seperate problem ) .
We now know there 's a wide variety of critical information that is n't available when a computer 's powered off - if a ( trojan ) malware object was present on the drive at capture , with a purely offline view can you prove whether it was loaded into the OS when the evidence was seized ?
How about open file handles/network connections ?
Encryption keys ? If he has interfered with the computer in any way by plugging in a USB key , then the evidence is contaminated.The article probably oversimplifies , simple USB keys that just come pre-loaded with software to search drives are n't that interesting anymore , the idea is probably close to Tribble or something similar .
Not that there are n't problems with those kinds of devices... Rutkowska , 2007 ( pdf ) [ lollobox.org ]</tokentext>
<sentencetext>Real computer forensics involves getting the computer powered down, removing the disk, setting it up in a test jig with write protect enabled, and reading the complete image from the disk onto a sterile environment for analysis.That was true.. in 1998 (the fact that it's still such a pervasive misconception is a seperate problem).
We now know there's a wide variety of critical information that isn't available when a computer's powered off - if a (trojan) malware object was present on the drive at capture, with a purely offline view can you prove whether it was loaded into the OS when the evidence was seized?
How about open file handles/network connections?
Encryption keys?If he has interfered with the computer in any way by plugging in a USB key, then the evidence is contaminated.The article probably oversimplifies, simple USB keys that just come pre-loaded with software to search drives aren't that interesting anymore, the idea is probably close to Tribble or something similar.
Not that there aren't problems with those kinds of devices... Rutkowska, 2007 (pdf) [lollobox.org]
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200985</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28217707</id>
	<title>Re:Encryption=suspicious?</title>
	<author>hacker</author>
	<datestamp>1244128320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><blockquote><div><p>That whole "innocent <em> <strong>until</strong> </em> proven guilty" thing is something that the Founding Fathers felt strongly about...having lived in England.</p></div></blockquote><p>The bolded portion is precisely the problem! It <em>should</em> read "innocent <em> <strong>unless</strong> </em> proven guilty", but it doesn't. All it takes is enough time, and eventually (they contend) that <em>EVERYONE</em> is guilty... at some point.</p></div>
	</htmltext>
<tokenext>That whole " innocent until proven guilty " thing is something that the Founding Fathers felt strongly about...having lived in England.The bolded portion is precisely the problem !
It should read " innocent unless proven guilty " , but it does n't .
All it takes is enough time , and eventually ( they contend ) that EVERYONE is guilty... at some point .</tokentext>
<sentencetext>That whole "innocent  until  proven guilty" thing is something that the Founding Fathers felt strongly about...having lived in England.The bolded portion is precisely the problem!
It should read "innocent  unless  proven guilty", but it doesn't.
All it takes is enough time, and eventually (they contend) that EVERYONE is guilty... at some point.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200717</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205561</id>
	<title>Re:Oh geez! This is too easy!</title>
	<author>Meski</author>
	<datestamp>1244048280000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Wouldn't the 'owner' (SID) of the file be incorrect for someone writing files onto, say an NTFS volume from a Linux USB key?</p></htmltext>
<tokenext>Would n't the 'owner ' ( SID ) of the file be incorrect for someone writing files onto , say an NTFS volume from a Linux USB key ?</tokentext>
<sentencetext>Wouldn't the 'owner' (SID) of the file be incorrect for someone writing files onto, say an NTFS volume from a Linux USB key?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200775</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201037</id>
	<title>Example of this Device in use!</title>
	<author>MJM128</author>
	<datestamp>1244022780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>[Warning] Bittorent Client detected!
Possible Crime level - High<br> <br>

Book 'em Danno!</htmltext>
<tokenext>[ Warning ] Bittorent Client detected !
Possible Crime level - High Book 'em Danno !</tokentext>
<sentencetext>[Warning] Bittorent Client detected!
Possible Crime level - High 

Book 'em Danno!</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200845</id>
	<title>O RLY?</title>
	<author>Anonymous</author>
	<datestamp>1244022000000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext><p><div class="quote"><p>UK police are talking to private companies about using plug-in USB devices that can scour the hard drive of any device they are attached to</p></div><p>I've got a rackmount OpenBSD box that claims otherwise.</p></div>
	</htmltext>
<tokenext>UK police are talking to private companies about using plug-in USB devices that can scour the hard drive of any device they are attached toI 've got a rackmount OpenBSD box that claims otherwise .</tokentext>
<sentencetext>UK police are talking to private companies about using plug-in USB devices that can scour the hard drive of any device they are attached toI've got a rackmount OpenBSD box that claims otherwise.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200645</id>
	<title>Encryption=suspicious?</title>
	<author>wjh31</author>
	<datestamp>1244021340000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext>that'll probably work fine for the lay-man, but will having an encrypted hard drive count as evidence of illegal activity</htmltext>
<tokenext>that 'll probably work fine for the lay-man , but will having an encrypted hard drive count as evidence of illegal activity</tokentext>
<sentencetext>that'll probably work fine for the lay-man, but will having an encrypted hard drive count as evidence of illegal activity</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200855</id>
	<title>Umm, these devices are security risks people...</title>
	<author>KreAture</author>
	<datestamp>1244022060000</datestamp>
	<modclass>Insightful</modclass>
	<modscore>2</modscore>
	<htmltext><p>Why has noone pointed out that these devices are using security holes to gain access and that these holes are being or should be blocked on most OS'es.  It's probably just a matter of time before they will need a different ploy anyways.</p><p>A simple web-search turns up a tonn of comercial solutions already.<br>Many companys already require usb security suits to be installed on all company computers.</p><p>In the meantime disabeling drivers and locking down the policys required to re-enable (in windows that is) might be one way.</p></htmltext>
<tokenext>Why has noone pointed out that these devices are using security holes to gain access and that these holes are being or should be blocked on most OS'es .
It 's probably just a matter of time before they will need a different ploy anyways.A simple web-search turns up a tonn of comercial solutions already.Many companys already require usb security suits to be installed on all company computers.In the meantime disabeling drivers and locking down the policys required to re-enable ( in windows that is ) might be one way .</tokentext>
<sentencetext>Why has noone pointed out that these devices are using security holes to gain access and that these holes are being or should be blocked on most OS'es.
It's probably just a matter of time before they will need a different ploy anyways.A simple web-search turns up a tonn of comercial solutions already.Many companys already require usb security suits to be installed on all company computers.In the meantime disabeling drivers and locking down the policys required to re-enable (in windows that is) might be one way.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204183</id>
	<title>Firewire.</title>
	<author>drolli</author>
	<datestamp>1244036100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>They need firewire.</p></htmltext>
<tokenext>They need firewire .</tokentext>
<sentencetext>They need firewire.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203279</id>
	<title>What?</title>
	<author>okmijnuhb</author>
	<datestamp>1244031120000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>They still have crime in the UK? <br> <br>

I thought they eliminated all crime with all their surveillance cameras, and speed cameras etc. <br> <br>

Surely they must do more to fight crime. <br> <br>

Perhaps mandatory random strip searches, home inspections, unfettered police access to citizens residences and possessions for examination for criminal activity. <br> <br>

Or increase the penalties for all crimes to bankrupt jaywalkers, and incarcerate speeders for life. <br> <br>

This UK government is too lax. They need to begin to take charge and control and monitor the population better. <br> <br>

They should arrest/execute citizens before a crime occurs. That should be the goal.</htmltext>
<tokenext>They still have crime in the UK ?
I thought they eliminated all crime with all their surveillance cameras , and speed cameras etc .
Surely they must do more to fight crime .
Perhaps mandatory random strip searches , home inspections , unfettered police access to citizens residences and possessions for examination for criminal activity .
Or increase the penalties for all crimes to bankrupt jaywalkers , and incarcerate speeders for life .
This UK government is too lax .
They need to begin to take charge and control and monitor the population better .
They should arrest/execute citizens before a crime occurs .
That should be the goal .</tokentext>
<sentencetext>They still have crime in the UK?
I thought they eliminated all crime with all their surveillance cameras, and speed cameras etc.
Surely they must do more to fight crime.
Perhaps mandatory random strip searches, home inspections, unfettered police access to citizens residences and possessions for examination for criminal activity.
Or increase the penalties for all crimes to bankrupt jaywalkers, and incarcerate speeders for life.
This UK government is too lax.
They need to begin to take charge and control and monitor the population better.
They should arrest/execute citizens before a crime occurs.
That should be the goal.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203923</id>
	<title>Re:Why not....</title>
	<author>Anonymous</author>
	<datestamp>1244034240000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Because that'll make it easier for terrorists and paedos</p></htmltext>
<tokenext>Because that 'll make it easier for terrorists and paedos</tokentext>
<sentencetext>Because that'll make it easier for terrorists and paedos</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200869</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201573</id>
	<title>Justice delayed</title>
	<author>Darinbob</author>
	<datestamp>1244024700000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Basically I feel that if the police confiscate some item as potential evidence, then they need to examine it in an expedited way.  They should never just be allowed to shove something in a warehouse to get to at some undetermined future date!  Justice delayed is justice denied (William Gladstone, <i>British</i> politician).</htmltext>
<tokenext>Basically I feel that if the police confiscate some item as potential evidence , then they need to examine it in an expedited way .
They should never just be allowed to shove something in a warehouse to get to at some undetermined future date !
Justice delayed is justice denied ( William Gladstone , British politician ) .</tokentext>
<sentencetext>Basically I feel that if the police confiscate some item as potential evidence, then they need to examine it in an expedited way.
They should never just be allowed to shove something in a warehouse to get to at some undetermined future date!
Justice delayed is justice denied (William Gladstone, British politician).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200675</id>
	<title>Re:Perfectly Legitimate</title>
	<author>morgan\_greywolf</author>
	<datestamp>1244021460000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Assuming they have been legally seized.  OTOH, the potential for abuse is high.  A cop stops you for speeding, sees your laptop and demands to see it.  He plugs in his USB "felony probe device," which detects an unknown operating system (Linux? FreeBSD?), which alerts the cop with a flashing red LED on the device, and he subsequently arrests you.  For what he has no idea, the device just told him to.</p></htmltext>
<tokenext>Assuming they have been legally seized .
OTOH , the potential for abuse is high .
A cop stops you for speeding , sees your laptop and demands to see it .
He plugs in his USB " felony probe device , " which detects an unknown operating system ( Linux ?
FreeBSD ? ) , which alerts the cop with a flashing red LED on the device , and he subsequently arrests you .
For what he has no idea , the device just told him to .</tokentext>
<sentencetext>Assuming they have been legally seized.
OTOH, the potential for abuse is high.
A cop stops you for speeding, sees your laptop and demands to see it.
He plugs in his USB "felony probe device," which detects an unknown operating system (Linux?
FreeBSD?), which alerts the cop with a flashing red LED on the device, and he subsequently arrests you.
For what he has no idea, the device just told him to.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200549</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201009</id>
	<title>Typical user behaviour, asking for "impossible"</title>
	<author>ccr</author>
	<datestamp>1244022660000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>So, as usual, they are asking for an solution that is impossible to implement, at least in any meaningfully reliable way. I mean, how does one sanely "detect" child pornography or any other illegal content to begin with?</p><p>Despite these insurmountable odds, I am fairly certain that there will be a long line of companies willing to try and do some half-assed gadgets, because there will be lots of money involved.</p></htmltext>
<tokenext>So , as usual , they are asking for an solution that is impossible to implement , at least in any meaningfully reliable way .
I mean , how does one sanely " detect " child pornography or any other illegal content to begin with ? Despite these insurmountable odds , I am fairly certain that there will be a long line of companies willing to try and do some half-assed gadgets , because there will be lots of money involved .</tokentext>
<sentencetext>So, as usual, they are asking for an solution that is impossible to implement, at least in any meaningfully reliable way.
I mean, how does one sanely "detect" child pornography or any other illegal content to begin with?Despite these insurmountable odds, I am fairly certain that there will be a long line of companies willing to try and do some half-assed gadgets, because there will be lots of money involved.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203019</id>
	<title>virus  danger</title>
	<author>Anonymous</author>
	<datestamp>1244029980000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>If your computer was virusfree before it may not longer be afterwards....</p></htmltext>
<tokenext>If your computer was virusfree before it may not longer be afterwards... .</tokentext>
<sentencetext>If your computer was virusfree before it may not longer be afterwards....</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201481</id>
	<title>No just evil - illegal!</title>
	<author>denzacar</author>
	<datestamp>1244024340000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>It is evil to disown your kids and leave family fortune to cats. But it is not illegal.<br>It is evil to kick a man out into the street with no compensation after 30 years of service to the company - but it is not illegal.<br>On the other hand - in most countries it is illegal to make a backup copy of the CD/DVD you bought legally. Or download one from the internet without buying it again.</p><p>So not only must this magical tool be able to recognize any and all illegal media (from downloaded music to drawings depicting sex with minors) - it must also have instant access to, and understanding of every single law in the land.<br>Now, unless they manage somehow to create an actual AI (even a limited one that would only comprehend matters of law) - I don't see this happening.</p><p>On a positive(?) side, if they ever do create something like that, most crimes would not need an actual trial.<br>Just have the police officer plug in the connector to the computer, have it read out the sentence, and escort the "criminal" to the jail.<br>If that ever happens I strongly suggest investing into cement factories, lower and medium quality steel and rough textiles cause there will be a serious lack of prison space and uniforms.</p></htmltext>
<tokenext>It is evil to disown your kids and leave family fortune to cats .
But it is not illegal.It is evil to kick a man out into the street with no compensation after 30 years of service to the company - but it is not illegal.On the other hand - in most countries it is illegal to make a backup copy of the CD/DVD you bought legally .
Or download one from the internet without buying it again.So not only must this magical tool be able to recognize any and all illegal media ( from downloaded music to drawings depicting sex with minors ) - it must also have instant access to , and understanding of every single law in the land.Now , unless they manage somehow to create an actual AI ( even a limited one that would only comprehend matters of law ) - I do n't see this happening.On a positive ( ?
) side , if they ever do create something like that , most crimes would not need an actual trial.Just have the police officer plug in the connector to the computer , have it read out the sentence , and escort the " criminal " to the jail.If that ever happens I strongly suggest investing into cement factories , lower and medium quality steel and rough textiles cause there will be a serious lack of prison space and uniforms .</tokentext>
<sentencetext>It is evil to disown your kids and leave family fortune to cats.
But it is not illegal.It is evil to kick a man out into the street with no compensation after 30 years of service to the company - but it is not illegal.On the other hand - in most countries it is illegal to make a backup copy of the CD/DVD you bought legally.
Or download one from the internet without buying it again.So not only must this magical tool be able to recognize any and all illegal media (from downloaded music to drawings depicting sex with minors) - it must also have instant access to, and understanding of every single law in the land.Now, unless they manage somehow to create an actual AI (even a limited one that would only comprehend matters of law) - I don't see this happening.On a positive(?
) side, if they ever do create something like that, most crimes would not need an actual trial.Just have the police officer plug in the connector to the computer, have it read out the sentence, and escort the "criminal" to the jail.If that ever happens I strongly suggest investing into cement factories, lower and medium quality steel and rough textiles cause there will be a serious lack of prison space and uniforms.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200581</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200791</id>
	<title>Re:Encryption=suspicious?</title>
	<author>twidarkling</author>
	<datestamp>1244021820000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>It already does, there. If you don't turn over your encryption code, you get a nice trip to jail.</p></htmltext>
<tokenext>It already does , there .
If you do n't turn over your encryption code , you get a nice trip to jail .</tokentext>
<sentencetext>It already does, there.
If you don't turn over your encryption code, you get a nice trip to jail.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200645</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202743</id>
	<title>Re:USB?</title>
	<author>4pins</author>
	<datestamp>1244028840000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>You boot off the "special" USB device.<br>
Then the OS on the USB device mounts the various disks/partitions/volumes on the system.<br>
Then it searches what it has mounted.<br> <br>
A crude one of these, which would work in most cases, could be made fairly simply using Linux.</htmltext>
<tokenext>You boot off the " special " USB device .
Then the OS on the USB device mounts the various disks/partitions/volumes on the system .
Then it searches what it has mounted .
A crude one of these , which would work in most cases , could be made fairly simply using Linux .</tokentext>
<sentencetext>You boot off the "special" USB device.
Then the OS on the USB device mounts the various disks/partitions/volumes on the system.
Then it searches what it has mounted.
A crude one of these, which would work in most cases, could be made fairly simply using Linux.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203953</id>
	<title>The UK police want a magic wand.</title>
	<author>Nekomusume</author>
	<datestamp>1244034420000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Who doesn't want a magic wand?</p></htmltext>
<tokenext>Who does n't want a magic wand ?</tokentext>
<sentencetext>Who doesn't want a magic wand?</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28210453</id>
	<title>Re:My laptop doesn't have a built-in CD-ROM drive.</title>
	<author>mikael</author>
	<datestamp>1244133780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><i>The BIOS (including the boot-selection page) is password protected.</i></p><p>Usually there is a DIP switch on the motherboard to bypass the BIOS password. For laptops it is accessible by removing one of the underside panels. For desktops it will require removing a side-panel or two. Slightly less effort than replacing the batteries on a remote control.</p></htmltext>
<tokenext>The BIOS ( including the boot-selection page ) is password protected.Usually there is a DIP switch on the motherboard to bypass the BIOS password .
For laptops it is accessible by removing one of the underside panels .
For desktops it will require removing a side-panel or two .
Slightly less effort than replacing the batteries on a remote control .</tokentext>
<sentencetext>The BIOS (including the boot-selection page) is password protected.Usually there is a DIP switch on the motherboard to bypass the BIOS password.
For laptops it is accessible by removing one of the underside panels.
For desktops it will require removing a side-panel or two.
Slightly less effort than replacing the batteries on a remote control.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201075</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201651</id>
	<title>Re:Great...</title>
	<author>Fred\_A</author>
	<datestamp>1244024940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>And for those of us with 10's of thousands of documents on our computers?  How well are these going to be able to differentiate between a PDF file that involves fiction and one that is real?  Hell, some of my source material for a horror screenplay I tinker with now and then has made-up schematics and lists of where and how people are going to be killed in the scenes.</p></div><p>That's ok, you will have done *something* wrong. In this case, it's of course nice of you to provide all the paperwork in advance. But it really works with anyone. We've seen in all. We can make pretty much anything stick to anyone.</p><p><i>Your friendly neighbourhood intelligence agency.</i></p><p>Don't you think we're in any way interested in what's in your computer. It's just a way to add some fairy dust to a case.<br>"Lookee Mr Judge, here's what we found on this annoying person's computer with our magical widget"<br>(hands over printouts of cesium bomb with maps of central London with ominous arrows)<br>"What ? I've never seen those in my life"<br>"Well, that's what they all say of course"<br>"I propose that we resurrect quartering"</p></div>
	</htmltext>
<tokenext>And for those of us with 10 's of thousands of documents on our computers ?
How well are these going to be able to differentiate between a PDF file that involves fiction and one that is real ?
Hell , some of my source material for a horror screenplay I tinker with now and then has made-up schematics and lists of where and how people are going to be killed in the scenes.That 's ok , you will have done * something * wrong .
In this case , it 's of course nice of you to provide all the paperwork in advance .
But it really works with anyone .
We 've seen in all .
We can make pretty much anything stick to anyone.Your friendly neighbourhood intelligence agency.Do n't you think we 're in any way interested in what 's in your computer .
It 's just a way to add some fairy dust to a case .
" Lookee Mr Judge , here 's what we found on this annoying person 's computer with our magical widget " ( hands over printouts of cesium bomb with maps of central London with ominous arrows ) " What ?
I 've never seen those in my life " " Well , that 's what they all say of course " " I propose that we resurrect quartering "</tokentext>
<sentencetext>And for those of us with 10's of thousands of documents on our computers?
How well are these going to be able to differentiate between a PDF file that involves fiction and one that is real?
Hell, some of my source material for a horror screenplay I tinker with now and then has made-up schematics and lists of where and how people are going to be killed in the scenes.That's ok, you will have done *something* wrong.
In this case, it's of course nice of you to provide all the paperwork in advance.
But it really works with anyone.
We've seen in all.
We can make pretty much anything stick to anyone.Your friendly neighbourhood intelligence agency.Don't you think we're in any way interested in what's in your computer.
It's just a way to add some fairy dust to a case.
"Lookee Mr Judge, here's what we found on this annoying person's computer with our magical widget"(hands over printouts of cesium bomb with maps of central London with ominous arrows)"What ?
I've never seen those in my life""Well, that's what they all say of course""I propose that we resurrect quartering"
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200975</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200813</id>
	<title>Inspired!</title>
	<author>shadowknot</author>
	<datestamp>1244021880000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>5</modscore>
	<htmltext><p><div class="quote"><p>Maybe they shouldn't seize so many computers.</p></div><p>
As someone working in Digital Forensics in the UK I can honestly say that this is the most inspired piece of wisdom I have seen in a long time.  Our company has literally had computers that haven't been switched on in a decade that have been sitting in a garage or attic until the cops decide to seize them.  This is good for business but bad for taxpayer expenditure and the expedient discovery of data of evidential worth.  The process for seizure of computer equipment in police investigations is essentially "if it has an on-off switch then seize it".  There needs to be some training given to officers seizing although I doubt they will as they are scared of the first case of non-seized items containing illicit material.</p></div>
	</htmltext>
<tokenext>Maybe they should n't seize so many computers .
As someone working in Digital Forensics in the UK I can honestly say that this is the most inspired piece of wisdom I have seen in a long time .
Our company has literally had computers that have n't been switched on in a decade that have been sitting in a garage or attic until the cops decide to seize them .
This is good for business but bad for taxpayer expenditure and the expedient discovery of data of evidential worth .
The process for seizure of computer equipment in police investigations is essentially " if it has an on-off switch then seize it " .
There needs to be some training given to officers seizing although I doubt they will as they are scared of the first case of non-seized items containing illicit material .</tokentext>
<sentencetext>Maybe they shouldn't seize so many computers.
As someone working in Digital Forensics in the UK I can honestly say that this is the most inspired piece of wisdom I have seen in a long time.
Our company has literally had computers that haven't been switched on in a decade that have been sitting in a garage or attic until the cops decide to seize them.
This is good for business but bad for taxpayer expenditure and the expedient discovery of data of evidential worth.
The process for seizure of computer equipment in police investigations is essentially "if it has an on-off switch then seize it".
There needs to be some training given to officers seizing although I doubt they will as they are scared of the first case of non-seized items containing illicit material.
	</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200721</id>
	<title>Re:Perfectly Legitimate</title>
	<author>fuzzyfuzzyfungus</author>
	<datestamp>1244021640000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext>While this move is legitimate in a structural sense(i.e. if the search would otherwise be legitimate, doing it with this would be ok, and if it is otherwise illegitimate, doing it with this wouldn't become ok); but there are practical considerations that make me nervous.<br> <br>

One is write blocking. To prevent corruption, tampering, and similar issues, it is good practice to use a hardware write blocker and, where possible, work from a disk image made from the original disk through a write blocker. A USB bootable system is not going to have that level of assurance. In a lot of cases, cops will have to monkey with the BIOS to get it to boot the USB drive and, with the vast number of BIOSes, chipsets, hardware RAID boards, softRAID crap, etc, etc. out there, trusting software to prevent tampering or corruption seems potentially troublesome.<br> <br>

More generally, the demand for a "PC breathalyzer" is a demand that a difficult problem be made trivial so it can be done by unskilled or ignorant people. That sort of demand is rarely a harbinger of future quality, which is disquieting when people's freedoms are potentially at stake.</htmltext>
<tokenext>While this move is legitimate in a structural sense ( i.e .
if the search would otherwise be legitimate , doing it with this would be ok , and if it is otherwise illegitimate , doing it with this would n't become ok ) ; but there are practical considerations that make me nervous .
One is write blocking .
To prevent corruption , tampering , and similar issues , it is good practice to use a hardware write blocker and , where possible , work from a disk image made from the original disk through a write blocker .
A USB bootable system is not going to have that level of assurance .
In a lot of cases , cops will have to monkey with the BIOS to get it to boot the USB drive and , with the vast number of BIOSes , chipsets , hardware RAID boards , softRAID crap , etc , etc .
out there , trusting software to prevent tampering or corruption seems potentially troublesome .
More generally , the demand for a " PC breathalyzer " is a demand that a difficult problem be made trivial so it can be done by unskilled or ignorant people .
That sort of demand is rarely a harbinger of future quality , which is disquieting when people 's freedoms are potentially at stake .</tokentext>
<sentencetext>While this move is legitimate in a structural sense(i.e.
if the search would otherwise be legitimate, doing it with this would be ok, and if it is otherwise illegitimate, doing it with this wouldn't become ok); but there are practical considerations that make me nervous.
One is write blocking.
To prevent corruption, tampering, and similar issues, it is good practice to use a hardware write blocker and, where possible, work from a disk image made from the original disk through a write blocker.
A USB bootable system is not going to have that level of assurance.
In a lot of cases, cops will have to monkey with the BIOS to get it to boot the USB drive and, with the vast number of BIOSes, chipsets, hardware RAID boards, softRAID crap, etc, etc.
out there, trusting software to prevent tampering or corruption seems potentially troublesome.
More generally, the demand for a "PC breathalyzer" is a demand that a difficult problem be made trivial so it can be done by unskilled or ignorant people.
That sort of demand is rarely a harbinger of future quality, which is disquieting when people's freedoms are potentially at stake.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200549</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201075</id>
	<title>My laptop doesn't have a built-in CD-ROM drive.</title>
	<author>mmell</author>
	<datestamp>1244022960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>The BIOS (including the boot-selection page) is password protected.  Even when a CD-ROM is physically attached, booting from CD-ROM/USB requires the system password.  Oh, and the hard disk incorporates password protection, which <i>is</i> configured.<p>
Easy enough for qualified personnel to defeat (along with the BIOS-level HDD password protection?  Probably).  That is, the nerd back at the police lab - not the PD's street soldiers.</p><p>
Go ahead - give 'em a hacker tool on a stick.  Let 'em feel like they're technically competent to conduct field investigations into an area which I'll wager most of them don't even remotely understand.  Oh, and let me raise questions at trial into the safeguards in place to prevent officers from inadvertantly/intentionally corrupting the contents of the filesystems they intend to investigate in the field.</p><p>
(I'm assuming their hacker's tool can automagically recognize and search ext3, ext4, jfs, ufs, xfs, reiserfs, FAT16, FAT32, NTFS, etc. . . . and let us not forget software-based filesystem encryption for many of the aforementioned filesystems).</p></htmltext>
<tokenext>The BIOS ( including the boot-selection page ) is password protected .
Even when a CD-ROM is physically attached , booting from CD-ROM/USB requires the system password .
Oh , and the hard disk incorporates password protection , which is configured .
Easy enough for qualified personnel to defeat ( along with the BIOS-level HDD password protection ?
Probably ) . That is , the nerd back at the police lab - not the PD 's street soldiers .
Go ahead - give 'em a hacker tool on a stick .
Let 'em feel like they 're technically competent to conduct field investigations into an area which I 'll wager most of them do n't even remotely understand .
Oh , and let me raise questions at trial into the safeguards in place to prevent officers from inadvertantly/intentionally corrupting the contents of the filesystems they intend to investigate in the field .
( I 'm assuming their hacker 's tool can automagically recognize and search ext3 , ext4 , jfs , ufs , xfs , reiserfs , FAT16 , FAT32 , NTFS , etc .
. .
. and let us not forget software-based filesystem encryption for many of the aforementioned filesystems ) .</tokentext>
<sentencetext>The BIOS (including the boot-selection page) is password protected.
Even when a CD-ROM is physically attached, booting from CD-ROM/USB requires the system password.
Oh, and the hard disk incorporates password protection, which is configured.
Easy enough for qualified personnel to defeat (along with the BIOS-level HDD password protection?
Probably).  That is, the nerd back at the police lab - not the PD's street soldiers.
Go ahead - give 'em a hacker tool on a stick.
Let 'em feel like they're technically competent to conduct field investigations into an area which I'll wager most of them don't even remotely understand.
Oh, and let me raise questions at trial into the safeguards in place to prevent officers from inadvertantly/intentionally corrupting the contents of the filesystems they intend to investigate in the field.
(I'm assuming their hacker's tool can automagically recognize and search ext3, ext4, jfs, ufs, xfs, reiserfs, FAT16, FAT32, NTFS, etc.
. .
. and let us not forget software-based filesystem encryption for many of the aforementioned filesystems).</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204589</id>
	<title>How about this?</title>
	<author>Master of Transhuman</author>
	<datestamp>1244039100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Grep "porn"</p></htmltext>
<tokenext>Grep " porn "</tokentext>
<sentencetext>Grep "porn"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202075</id>
	<title>A new motherboard feature seems called for</title>
	<author>stevelinton</author>
	<datestamp>1244026320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>and I never previously new there was a need for the circuit that dumps 10000 volts into the USB port unless disabled by the right software action.</p></htmltext>
<tokenext>and I never previously new there was a need for the circuit that dumps 10000 volts into the USB port unless disabled by the right software action .</tokentext>
<sentencetext>and I never previously new there was a need for the circuit that dumps 10000 volts into the USB port unless disabled by the right software action.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202689</id>
	<title>Re:Perfectly Legitimate</title>
	<author>Anonymous</author>
	<datestamp>1244028600000</datestamp>
	<modclass>Informativ</modclass>
	<modscore>1</modscore>
	<htmltext><p>The issue of proper write blocking practices is likely where this idea will fail. In order for digital evidence to be considered admissible (and not be discredited by an opposing examiner during trial), it would need to be forensically sound. At least this is true in most courts.</p><p>In most cases, this requires that the media be examined without having been altered in any way. This is why great lengths are taken by forensic examiners to properly image media bit by bit, then (using MD5 values) prove that their image is an exact copy. This is the reason hardware tools such as write blockers that are regularly tested must be used on every acquisition.</p><p>Can you imagine if a beat cop was charged with the task of performing a forensic acquisition? Inevitably a tool simple enough to be deployed this way would need to be so automated that just about any opposing examiner could discredit its functionality with basic forensic knowledge.</p></htmltext>
<tokenext>The issue of proper write blocking practices is likely where this idea will fail .
In order for digital evidence to be considered admissible ( and not be discredited by an opposing examiner during trial ) , it would need to be forensically sound .
At least this is true in most courts.In most cases , this requires that the media be examined without having been altered in any way .
This is why great lengths are taken by forensic examiners to properly image media bit by bit , then ( using MD5 values ) prove that their image is an exact copy .
This is the reason hardware tools such as write blockers that are regularly tested must be used on every acquisition.Can you imagine if a beat cop was charged with the task of performing a forensic acquisition ?
Inevitably a tool simple enough to be deployed this way would need to be so automated that just about any opposing examiner could discredit its functionality with basic forensic knowledge .</tokentext>
<sentencetext>The issue of proper write blocking practices is likely where this idea will fail.
In order for digital evidence to be considered admissible (and not be discredited by an opposing examiner during trial), it would need to be forensically sound.
At least this is true in most courts.In most cases, this requires that the media be examined without having been altered in any way.
This is why great lengths are taken by forensic examiners to properly image media bit by bit, then (using MD5 values) prove that their image is an exact copy.
This is the reason hardware tools such as write blockers that are regularly tested must be used on every acquisition.Can you imagine if a beat cop was charged with the task of performing a forensic acquisition?
Inevitably a tool simple enough to be deployed this way would need to be so automated that just about any opposing examiner could discredit its functionality with basic forensic knowledge.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200721</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202221</id>
	<title>Re:Great...</title>
	<author>newcastlejon</author>
	<datestamp>1244026860000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>Firstly, we don't have attorneys. Secondly, the officer in charge already has the authority to search your home and possibly confiscate items therein; if they suspected you of something they'd probably have arrested you shortly after stepping over the threshold.<p>If things happen as you describe this thing will be stopped. We've just stopped a tiny bit of corruption over here, and most of us feel like we're on a roll.</p></htmltext>
<tokenext>Firstly , we do n't have attorneys .
Secondly , the officer in charge already has the authority to search your home and possibly confiscate items therein ; if they suspected you of something they 'd probably have arrested you shortly after stepping over the threshold.If things happen as you describe this thing will be stopped .
We 've just stopped a tiny bit of corruption over here , and most of us feel like we 're on a roll .</tokentext>
<sentencetext>Firstly, we don't have attorneys.
Secondly, the officer in charge already has the authority to search your home and possibly confiscate items therein; if they suspected you of something they'd probably have arrested you shortly after stepping over the threshold.If things happen as you describe this thing will be stopped.
We've just stopped a tiny bit of corruption over here, and most of us feel like we're on a roll.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202085</id>
	<title>Re:O RLY?</title>
	<author>Anonymous</author>
	<datestamp>1244026320000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Heck, I've got a toaster that claims otherwise.</p><p>What exactly constitutes a "device", anyway?</p></htmltext>
<tokenext>Heck , I 've got a toaster that claims otherwise.What exactly constitutes a " device " , anyway ?</tokentext>
<sentencetext>Heck, I've got a toaster that claims otherwise.What exactly constitutes a "device", anyway?</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200845</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200913</id>
	<title>I can provide what they need!</title>
	<author>Anonymous</author>
	<datestamp>1244022300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>For the small fee of, say, &#194;&pound;10000 I can get the UK what they need. I will provide them with an empty USB memory, and a letter explaining that what they are looking for can't be done. At least not if the suspected computer criminal is any good: the files can be encrypted, stored inside an encrypted ZIP-file, hidden inside a hidden encrypted partition on the hard drive. If that level of secrecy is not enough, the child porn pictures can be steganographically hidden inside other (completely innocent) pictures (or inside MP3 files for a bit of variation), and unless you know they are there you are utterly unlikely to ever find them...
<br> <br>
I wonder how long it will take the authorities to realise that "theft" or "possesion of illegal goods" in the computer world are very different to "theft" and "possesion of illegal goods" in the physical world. If you have a stolen item in your house, hiding it in such a way that a thorough search does not find it is hard. Hiding a "stolen" file on a modern computer is not trivial, but it can be done if you have the knowledge. And this knowledge is not hard to find.</htmltext>
<tokenext>For the small fee of , say ,     10000 I can get the UK what they need .
I will provide them with an empty USB memory , and a letter explaining that what they are looking for ca n't be done .
At least not if the suspected computer criminal is any good : the files can be encrypted , stored inside an encrypted ZIP-file , hidden inside a hidden encrypted partition on the hard drive .
If that level of secrecy is not enough , the child porn pictures can be steganographically hidden inside other ( completely innocent ) pictures ( or inside MP3 files for a bit of variation ) , and unless you know they are there you are utterly unlikely to ever find them.. . I wonder how long it will take the authorities to realise that " theft " or " possesion of illegal goods " in the computer world are very different to " theft " and " possesion of illegal goods " in the physical world .
If you have a stolen item in your house , hiding it in such a way that a thorough search does not find it is hard .
Hiding a " stolen " file on a modern computer is not trivial , but it can be done if you have the knowledge .
And this knowledge is not hard to find .</tokentext>
<sentencetext>For the small fee of, say, Â£10000 I can get the UK what they need.
I will provide them with an empty USB memory, and a letter explaining that what they are looking for can't be done.
At least not if the suspected computer criminal is any good: the files can be encrypted, stored inside an encrypted ZIP-file, hidden inside a hidden encrypted partition on the hard drive.
If that level of secrecy is not enough, the child porn pictures can be steganographically hidden inside other (completely innocent) pictures (or inside MP3 files for a bit of variation), and unless you know they are there you are utterly unlikely to ever find them...
 
I wonder how long it will take the authorities to realise that "theft" or "possesion of illegal goods" in the computer world are very different to "theft" and "possesion of illegal goods" in the physical world.
If you have a stolen item in your house, hiding it in such a way that a thorough search does not find it is hard.
Hiding a "stolen" file on a modern computer is not trivial, but it can be done if you have the knowledge.
And this knowledge is not hard to find.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207689</id>
	<title>Huh, that reminds me..</title>
	<author>keshet</author>
	<datestamp>1244120940000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>..where did I put that? *rummage* *rummage*.. Ah, here it is..<br>http://www.kashat.net/unregistered.html</p></htmltext>
<tokenext>..where did I put that ?
* rummage * * rummage * .. Ah , here it is..http : //www.kashat.net/unregistered.html</tokentext>
<sentencetext>..where did I put that?
*rummage* *rummage*.. Ah, here it is..http://www.kashat.net/unregistered.html</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206737</id>
	<title>Who's that at the door, Darling?</title>
	<author>SST-206</author>
	<datestamp>1244108100000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p> <b>OMG NO</b>! It's
<a href="http://www.viz.co.uk/" title="viz.co.uk" rel="nofollow">The Bottom Inspectors</a> [viz.co.uk]! Quick! Hide <a href="http://nannyknowsbest.blogspot.com/2004/11/rise-of-bottom-inspectors.html" title="blogspot.com" rel="nofollow">the children</a> [blogspot.com]!!!1</p></htmltext>
<tokenext>OMG NO !
It 's The Bottom Inspectors [ viz.co.uk ] !
Quick ! Hide the children [ blogspot.com ] ! !
! 1</tokentext>
<sentencetext> OMG NO!
It's
The Bottom Inspectors [viz.co.uk]!
Quick! Hide the children [blogspot.com]!!
!1</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200781</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201081</id>
	<title>Re:the headline ten years from now...</title>
	<author>Chabo</author>
	<datestamp>1244022960000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>certain "inalienable" rights</p></div><p>Don't you know anything? It's <i>un</i>alienable.<nobr> <wbr></nobr>;)</p></div>
	</htmltext>
<tokenext>certain " inalienable " rightsDo n't you know anything ?
It 's unalienable .
; )</tokentext>
<sentencetext>certain "inalienable" rightsDon't you know anything?
It's unalienable.
;)
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200753</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204105</id>
	<title>Re:Great...</title>
	<author>shtrom</author>
	<datestamp>1244035560000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>We recently had a talk from a forensic expert from Deloitte Forensic Data (an australian company) in a Uni Security Engineering lecture. He made it clear that nothing was better than experience when trying to collect forensic information or retrieve hidden data from seized computers.</p><p>Thinking about it, that makes complete sense. There are so many ways to hide anything anywhere in a computer. If they want to be safe from this type of tools, people could just verify what the program checks, and do something else. Even with an ever updated database of &#226;oethings to check,&#226; people with things to hide will always be ahead of a non-thinking entity.</p></htmltext>
<tokenext>We recently had a talk from a forensic expert from Deloitte Forensic Data ( an australian company ) in a Uni Security Engineering lecture .
He made it clear that nothing was better than experience when trying to collect forensic information or retrieve hidden data from seized computers.Thinking about it , that makes complete sense .
There are so many ways to hide anything anywhere in a computer .
If they want to be safe from this type of tools , people could just verify what the program checks , and do something else .
Even with an ever updated database of   oethings to check ,   people with things to hide will always be ahead of a non-thinking entity .</tokentext>
<sentencetext>We recently had a talk from a forensic expert from Deloitte Forensic Data (an australian company) in a Uni Security Engineering lecture.
He made it clear that nothing was better than experience when trying to collect forensic information or retrieve hidden data from seized computers.Thinking about it, that makes complete sense.
There are so many ways to hide anything anywhere in a computer.
If they want to be safe from this type of tools, people could just verify what the program checks, and do something else.
Even with an ever updated database of âoethings to check,â people with things to hide will always be ahead of a non-thinking entity.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202615</id>
	<title>USB "port" connected to second power cord</title>
	<author>RancidPickle</author>
	<datestamp>1244028300000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Gets rid of all those nasty attempts to break in. Sometimes will get rid of nasty Bobbies. Make sure you put a little lightning sticker near the port so you can say, "Well, it was marked as power, but the gent plugged it in there anyway and started a cool light show. I assumed he knew what he was doing."</p></htmltext>
<tokenext>Gets rid of all those nasty attempts to break in .
Sometimes will get rid of nasty Bobbies .
Make sure you put a little lightning sticker near the port so you can say , " Well , it was marked as power , but the gent plugged it in there anyway and started a cool light show .
I assumed he knew what he was doing .
"</tokentext>
<sentencetext>Gets rid of all those nasty attempts to break in.
Sometimes will get rid of nasty Bobbies.
Make sure you put a little lightning sticker near the port so you can say, "Well, it was marked as power, but the gent plugged it in there anyway and started a cool light show.
I assumed he knew what he was doing.
"</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201185</id>
	<title>Any device? O RLY?</title>
	<author>davidwr</author>
	<datestamp>1244023320000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>What about devices that can't boot from USB or whose password-protected BIOSes have boot from hard drive prioritized higher than boot from USB?</p><p>Far more realistic is a set of tools:</p><p>* For computers that need to be left on, a method to transport the computer without disrupting the electrical or network connections.</p><p>* For other computers, a means to quickly copy the data from the drives.</p><p>* For computers that can be booted with another media like a floppy, cdrom, or USB, you win.</p><p>For computers that can't be booted and whose BIOS cannot be altered to boot from one of those devices, you need to be able to unscrew the case, unplug the hard drive, then either boot from another device if you can then plug the hard disk into an external USB adapter so you can hot-plug it for read access.  If that doesn't work, plug the hard disk into your portable computer's USB port for reading.</p><p>All in all the safest thing to do if you don't need the machine to stay powered on is to turn it off and take it into a forensic lab and pull the data using established, court-recognized procedures.<br>For forensic purposes make damn sure you never write to the drive and that you can prove that you did not write to the drive.</p></htmltext>
<tokenext>What about devices that ca n't boot from USB or whose password-protected BIOSes have boot from hard drive prioritized higher than boot from USB ? Far more realistic is a set of tools : * For computers that need to be left on , a method to transport the computer without disrupting the electrical or network connections .
* For other computers , a means to quickly copy the data from the drives .
* For computers that can be booted with another media like a floppy , cdrom , or USB , you win.For computers that ca n't be booted and whose BIOS can not be altered to boot from one of those devices , you need to be able to unscrew the case , unplug the hard drive , then either boot from another device if you can then plug the hard disk into an external USB adapter so you can hot-plug it for read access .
If that does n't work , plug the hard disk into your portable computer 's USB port for reading.All in all the safest thing to do if you do n't need the machine to stay powered on is to turn it off and take it into a forensic lab and pull the data using established , court-recognized procedures.For forensic purposes make damn sure you never write to the drive and that you can prove that you did not write to the drive .</tokentext>
<sentencetext>What about devices that can't boot from USB or whose password-protected BIOSes have boot from hard drive prioritized higher than boot from USB?Far more realistic is a set of tools:* For computers that need to be left on, a method to transport the computer without disrupting the electrical or network connections.
* For other computers, a means to quickly copy the data from the drives.
* For computers that can be booted with another media like a floppy, cdrom, or USB, you win.For computers that can't be booted and whose BIOS cannot be altered to boot from one of those devices, you need to be able to unscrew the case, unplug the hard drive, then either boot from another device if you can then plug the hard disk into an external USB adapter so you can hot-plug it for read access.
If that doesn't work, plug the hard disk into your portable computer's USB port for reading.All in all the safest thing to do if you don't need the machine to stay powered on is to turn it off and take it into a forensic lab and pull the data using established, court-recognized procedures.For forensic purposes make damn sure you never write to the drive and that you can prove that you did not write to the drive.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206801</id>
	<title>Re:Great...</title>
	<author>u38cg</author>
	<datestamp>1244108880000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>I suspect you will find a court does not have quite as high standards as you think.  Provided a police officer testifies that he plugged the device in, it ran, and it flagged up something, I can't really see a court throwing that out - particularly if the device can be independantly audited.</htmltext>
<tokenext>I suspect you will find a court does not have quite as high standards as you think .
Provided a police officer testifies that he plugged the device in , it ran , and it flagged up something , I ca n't really see a court throwing that out - particularly if the device can be independantly audited .</tokentext>
<sentencetext>I suspect you will find a court does not have quite as high standards as you think.
Provided a police officer testifies that he plugged the device in, it ran, and it flagged up something, I can't really see a court throwing that out - particularly if the device can be independantly audited.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200985</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200753</id>
	<title>the headline ten years from now...</title>
	<author>astra05</author>
	<datestamp>1244021700000</datestamp>
	<modclass>Offtopic</modclass>
	<modscore>0</modscore>
	<htmltext>I can just imagine the headline<nobr> <wbr></nobr>/. or whatever news website ten years from now: UK Govt bans Human Reproduction. Now all future UK citizens will produced in laboratories by private companies with Government oversight. This is due to the fact that UK Government can remove all Genes that will allow the human nature to want to see child pornography. Also in future citizen models they eliminate all crime and the ability to make free choice decisions. A UK Govt official was quoted saying "Now everyone in UK is safe because it is impossible to commit a crime."

*cough brave new world*


I say all of this because it seems like the UK is leading Western Society in destroying its citizens privacy and civil rights.

Oh well, at least here in the states we have the constitution to provide to certain "inalienable" rights. Oh wait, The US Govt ignores the Constitution?<nobr> <wbr></nobr>/end\_rant</htmltext>
<tokenext>I can just imagine the headline / .
or whatever news website ten years from now : UK Govt bans Human Reproduction .
Now all future UK citizens will produced in laboratories by private companies with Government oversight .
This is due to the fact that UK Government can remove all Genes that will allow the human nature to want to see child pornography .
Also in future citizen models they eliminate all crime and the ability to make free choice decisions .
A UK Govt official was quoted saying " Now everyone in UK is safe because it is impossible to commit a crime .
" * cough brave new world * I say all of this because it seems like the UK is leading Western Society in destroying its citizens privacy and civil rights .
Oh well , at least here in the states we have the constitution to provide to certain " inalienable " rights .
Oh wait , The US Govt ignores the Constitution ?
/end \ _rant</tokentext>
<sentencetext>I can just imagine the headline /.
or whatever news website ten years from now: UK Govt bans Human Reproduction.
Now all future UK citizens will produced in laboratories by private companies with Government oversight.
This is due to the fact that UK Government can remove all Genes that will allow the human nature to want to see child pornography.
Also in future citizen models they eliminate all crime and the ability to make free choice decisions.
A UK Govt official was quoted saying "Now everyone in UK is safe because it is impossible to commit a crime.
"

*cough brave new world*


I say all of this because it seems like the UK is leading Western Society in destroying its citizens privacy and civil rights.
Oh well, at least here in the states we have the constitution to provide to certain "inalienable" rights.
Oh wait, The US Govt ignores the Constitution?
/end\_rant</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200699</id>
	<title>Look Out! It's a Trap^H^HDupe!</title>
	<author>AgentSmith</author>
	<datestamp>1244021580000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>OK. We can go over this topic again.<br>
&nbsp;</p></htmltext>
<tokenext>OK. We can go over this topic again .
 </tokentext>
<sentencetext>OK. We can go over this topic again.
 </sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28210339</id>
	<title>Re:O RLY?</title>
	<author>Anonymous</author>
	<datestamp>1244133480000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p><div class="quote"><p><div class="quote"><p>UK police are talking to private companies about using plug-in USB devices that can scour the hard drive of any device they are attached to</p></div><p>I've got a rackmount OpenBSD box that claims otherwise.</p></div><p>I don't get it.  Why is this "Interesting?"  Are you implying that your box has no USB ports?  Then their device can't be attached to it and your point is moot.  Are you trying to say something else that I'm too uninformed to understand?</p></div>
	</htmltext>
<tokenext>UK police are talking to private companies about using plug-in USB devices that can scour the hard drive of any device they are attached toI 've got a rackmount OpenBSD box that claims otherwise.I do n't get it .
Why is this " Interesting ?
" Are you implying that your box has no USB ports ?
Then their device ca n't be attached to it and your point is moot .
Are you trying to say something else that I 'm too uninformed to understand ?</tokentext>
<sentencetext>UK police are talking to private companies about using plug-in USB devices that can scour the hard drive of any device they are attached toI've got a rackmount OpenBSD box that claims otherwise.I don't get it.
Why is this "Interesting?
"  Are you implying that your box has no USB ports?
Then their device can't be attached to it and your point is moot.
Are you trying to say something else that I'm too uninformed to understand?
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200845</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203495</id>
	<title>Re:Great...</title>
	<author>Dare nMc</author>
	<datestamp>1244032020000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>if a computer is manipulated in any way, the evidence may be corrupted by such operation</p></div><p>step 1) rip computer apart, and use another computer + software + introduced large drive that has had porn copied to it previously.</p><p>was that seriously a proposed solution to reduce mis-conduct possibility?</p><p>I understand your stated method is to preserve as much evidence with a copy,  but I would be much much happier as a jury member at a trial if the cops simply stuck USB key with less than 512 Mb of  capacity into side of laptop, in front of the defendant, pressed F10, to boot the drive, waited for report on screen.  placed both devices into chain of custody if a issue was found.</p><p>Instead of, broke computer apart, intermingled data with another (likely) larger capacity drive used in hundreds of investigations previously, and then jammed it back together, even if tested at a "independent" lab.  Granted with the USB drive your giving the PC owner the possibility of having a bios trap set to clear themselves of wrong doing, etc.  But really if you find gigs of child porn on a computer after a small usb drive that can be post inspected was inserted then removed, I would have less issue than your method of some un-inspectable machine with lots of space was used on parts of a that pc.</p></div>
	</htmltext>
<tokenext>if a computer is manipulated in any way , the evidence may be corrupted by such operationstep 1 ) rip computer apart , and use another computer + software + introduced large drive that has had porn copied to it previously.was that seriously a proposed solution to reduce mis-conduct possibility ? I understand your stated method is to preserve as much evidence with a copy , but I would be much much happier as a jury member at a trial if the cops simply stuck USB key with less than 512 Mb of capacity into side of laptop , in front of the defendant , pressed F10 , to boot the drive , waited for report on screen .
placed both devices into chain of custody if a issue was found.Instead of , broke computer apart , intermingled data with another ( likely ) larger capacity drive used in hundreds of investigations previously , and then jammed it back together , even if tested at a " independent " lab .
Granted with the USB drive your giving the PC owner the possibility of having a bios trap set to clear themselves of wrong doing , etc .
But really if you find gigs of child porn on a computer after a small usb drive that can be post inspected was inserted then removed , I would have less issue than your method of some un-inspectable machine with lots of space was used on parts of a that pc .</tokentext>
<sentencetext>if a computer is manipulated in any way, the evidence may be corrupted by such operationstep 1) rip computer apart, and use another computer + software + introduced large drive that has had porn copied to it previously.was that seriously a proposed solution to reduce mis-conduct possibility?I understand your stated method is to preserve as much evidence with a copy,  but I would be much much happier as a jury member at a trial if the cops simply stuck USB key with less than 512 Mb of  capacity into side of laptop, in front of the defendant, pressed F10, to boot the drive, waited for report on screen.
placed both devices into chain of custody if a issue was found.Instead of, broke computer apart, intermingled data with another (likely) larger capacity drive used in hundreds of investigations previously, and then jammed it back together, even if tested at a "independent" lab.
Granted with the USB drive your giving the PC owner the possibility of having a bios trap set to clear themselves of wrong doing, etc.
But really if you find gigs of child porn on a computer after a small usb drive that can be post inspected was inserted then removed, I would have less issue than your method of some un-inspectable machine with lots of space was used on parts of a that pc.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200985</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200869</id>
	<title>Why not....</title>
	<author>Darkness404</author>
	<datestamp>1244022120000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>3</modscore>
	<htmltext>Why not have an EU-wide mandate of a computer bill of rights? In this include the right to encryption and the right to keep your key to yourself.</htmltext>
<tokenext>Why not have an EU-wide mandate of a computer bill of rights ?
In this include the right to encryption and the right to keep your key to yourself .</tokentext>
<sentencetext>Why not have an EU-wide mandate of a computer bill of rights?
In this include the right to encryption and the right to keep your key to yourself.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203069</id>
	<title>Oblig</title>
	<author>Anonymous</author>
	<datestamp>1244030160000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>Can I arrest that thug?<br>Computer says no!</p></htmltext>
<tokenext>Can I arrest that thug ? Computer says no !</tokentext>
<sentencetext>Can I arrest that thug?Computer says no!</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207225</id>
	<title>Re:What?</title>
	<author>jonbryce</author>
	<datestamp>1244115060000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>Jaywalking is legal in the UK.</p></htmltext>
<tokenext>Jaywalking is legal in the UK .</tokentext>
<sentencetext>Jaywalking is legal in the UK.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203279</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201487</id>
	<title>Re:USB?</title>
	<author>Anonymous</author>
	<datestamp>1244024340000</datestamp>
	<modclass>None</modclass>
	<modscore>0</modscore>
	<htmltext><p>I assume the USB stick has its own OS and they will boot the computer off the USB stick.</p><p>It's either that, or they make it mandatory that all UK citizens must purchase and use Windows Vista/7 on NTFS so that terroristy linux/mac stuff doesn't get in the way.</p><p>I have old computers that are incapable of booting off USB though. Maybe that makes me a terrorist.</p></htmltext>
<tokenext>I assume the USB stick has its own OS and they will boot the computer off the USB stick.It 's either that , or they make it mandatory that all UK citizens must purchase and use Windows Vista/7 on NTFS so that terroristy linux/mac stuff does n't get in the way.I have old computers that are incapable of booting off USB though .
Maybe that makes me a terrorist .</tokentext>
<sentencetext>I assume the USB stick has its own OS and they will boot the computer off the USB stick.It's either that, or they make it mandatory that all UK citizens must purchase and use Windows Vista/7 on NTFS so that terroristy linux/mac stuff doesn't get in the way.I have old computers that are incapable of booting off USB though.
Maybe that makes me a terrorist.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200797</id>
	<title>Re:Encryption=suspicious?</title>
	<author>dnaumov</author>
	<datestamp>1244021820000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p><div class="quote"><p>that'll probably work fine for the lay-man, but will having an encrypted hard drive count as evidence of illegal activity</p></div><p>If you don't supply the password when asked by the court, then sure.</p></div>
	</htmltext>
<tokenext>that 'll probably work fine for the lay-man , but will having an encrypted hard drive count as evidence of illegal activityIf you do n't supply the password when asked by the court , then sure .</tokentext>
<sentencetext>that'll probably work fine for the lay-man, but will having an encrypted hard drive count as evidence of illegal activityIf you don't supply the password when asked by the court, then sure.
	</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200645</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203445</id>
	<title>Re:Encryption=suspicious?</title>
	<author>UnrefinedLayman</author>
	<datestamp>1244031780000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>No research == fail. The colonies were <i>not</i> England.
<br> <br>
Most of the 1787 delegates were natives of the Thirteen Colonies. Only 9 were born elsewhere: four (Butler, Fitzsimons, McHenry, and Paterson) in Ireland, two (Davie and Robert Morris) in England, two (Wilson and Witherspoon) in Scotland, and one (Hamilton) in the West Indies.
<br> <br>
<a href="http://en.wikipedia.org/wiki/Founding\_Fathers\_of\_the\_United\_States#Demographics" title="wikipedia.org">Sourced</a> [wikipedia.org]</htmltext>
<tokenext>No research = = fail .
The colonies were not England .
Most of the 1787 delegates were natives of the Thirteen Colonies .
Only 9 were born elsewhere : four ( Butler , Fitzsimons , McHenry , and Paterson ) in Ireland , two ( Davie and Robert Morris ) in England , two ( Wilson and Witherspoon ) in Scotland , and one ( Hamilton ) in the West Indies .
Sourced [ wikipedia.org ]</tokentext>
<sentencetext>No research == fail.
The colonies were not England.
Most of the 1787 delegates were natives of the Thirteen Colonies.
Only 9 were born elsewhere: four (Butler, Fitzsimons, McHenry, and Paterson) in Ireland, two (Davie and Robert Morris) in England, two (Wilson and Witherspoon) in Scotland, and one (Hamilton) in the West Indies.
Sourced [wikipedia.org]</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200717</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203261</id>
	<title>Yet another reason to move to Linux</title>
	<author>JustNiz</author>
	<datestamp>1244031000000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext><p>...as if there weren't enough already.</p><p>You can bet this thing will entirely operate on the presumption that every PC runs windows.</p></htmltext>
<tokenext>...as if there were n't enough already.You can bet this thing will entirely operate on the presumption that every PC runs windows .</tokentext>
<sentencetext>...as if there weren't enough already.You can bet this thing will entirely operate on the presumption that every PC runs windows.</sentencetext>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200951</id>
	<title>Re:and the companion product....</title>
	<author>Anonymous</author>
	<datestamp>1244022480000</datestamp>
	<modclass>None</modclass>
	<modscore>1</modscore>
	<htmltext>And equally trivial will be installing that driver to the custom OS they'll run from a booting CD.</htmltext>
<tokenext>And equally trivial will be installing that driver to the custom OS they 'll run from a booting CD .</tokentext>
<sentencetext>And equally trivial will be installing that driver to the custom OS they'll run from a booting CD.</sentencetext>
	<parent>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200623</parent>
</comment>
<comment>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200581</id>
	<title>Urm?</title>
	<author>fuzzyfuzzyfungus</author>
	<datestamp>1244021160000</datestamp>
	<modclass>Interestin</modclass>
	<modscore>4</modscore>
	<htmltext>So, are they saying that they want existing forensics software, with a drool-proof wizard attached, bootable from a flash drive(because hell, who needs forensic hardware write blocking when you can <i>totally</i> trust software to do the job under any circumstance?) or are they actually proposing that the program be able to detect evil?</htmltext>
<tokenext>So , are they saying that they want existing forensics software , with a drool-proof wizard attached , bootable from a flash drive ( because hell , who needs forensic hardware write blocking when you can totally trust software to do the job under any circumstance ?
) or are they actually proposing that the program be able to detect evil ?</tokentext>
<sentencetext>So, are they saying that they want existing forensics software, with a drool-proof wizard attached, bootable from a flash drive(because hell, who needs forensic hardware write blocking when you can totally trust software to do the job under any circumstance?
) or are they actually proposing that the program be able to detect evil?</sentencetext>
</comment>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_53</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201337
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_44</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200775
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205561
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200985
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203495
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200753
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201081
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_60</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200813
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204115
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202067
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200845
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28210339
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200885
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207047
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_73</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200645
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204611
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_47</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200985
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206801
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_52</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200813
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201769
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200869
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203923
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_66</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201075
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28210453
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_37</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202743
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_42</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201705
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200549
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200675
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_72</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200623
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201027
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_67</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200869
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207237
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200581
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201481
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_29</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200645
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200717
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28217707
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_71</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200845
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202085
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_45</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203261
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206805
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_36</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203069
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_59</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200549
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200721
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202689
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200607
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202485
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_64</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200645
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200797
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_35</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200975
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203743
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205127
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202117
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_77</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200913
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201287
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200623
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200697
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_70</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202253
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_56</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201485
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200607
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205975
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_58</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201487
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_61</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202221
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_34</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28213909
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_57</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201775
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_48</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206463
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_51</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200975
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201651
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202361
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202151
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_76</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200507
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203031
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207061
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200645
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200717
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203445
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200885
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204857
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_75</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205285
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200723
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202411
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_49</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200985
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201709
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_43</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200813
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202449
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_68</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200507
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203031
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207711
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_39</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200993
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_50</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203279
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207225
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201449
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_46</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201007
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_40</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200781
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204673
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200645
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200791
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_69</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200781
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203739
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200813
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202415
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200549
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200681
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201671
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_74</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200507
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206727
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207103
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_65</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200905
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201359
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_38</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200901
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_41</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200623
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200951
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_32</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204105
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_55</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200607
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204925
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_28</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200507
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205557
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_31</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200507
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28208891
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206649
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_62</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28214193
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_33</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200869
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201191
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200807
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200885
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202111
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200645
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200717
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207069
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_63</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203077
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_54</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200845
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201553
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200781
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206737
</commentlist>
</thread>
<thread>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#thread_09_06_03_1951209_30</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200607
http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204325
</commentlist>
</thread>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.21</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201075
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28210453
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.22</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200869
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203923
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207237
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201191
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.20</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200811
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.9</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200723
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202411
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.7</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200801
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.14</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200813
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202415
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201769
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202449
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204115
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.12</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200507
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28208891
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206727
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205557
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203031
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207711
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207061
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.8</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200855
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.1</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203261
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206805
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.18</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200775
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205561
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.19</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200617
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.16</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200645
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200791
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200797
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200717
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28217707
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203445
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207069
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204611
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.2</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200753
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201081
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.5</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200781
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204673
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206737
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203739
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.13</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200581
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201481
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.0</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200523
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200905
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201359
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202253
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206463
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205285
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201337
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201485
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28214193
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205127
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206649
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.3</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201101
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202743
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28213909
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201487
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202117
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201775
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202067
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203077
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.30</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203279
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207225
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.10</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200549
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200675
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200681
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201671
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200721
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202689
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.11</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200619
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.6</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200913
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201287
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.25</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200525
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201007
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200975
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201651
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203743
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202361
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203069
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201705
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201449
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204105
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200993
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207103
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200985
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201709
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203495
--http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28206801
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202221
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202151
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200901
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200807
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.4</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200607
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202485
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204925
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204325
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28205975
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.17</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201009
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.23</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201159
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.15</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200623
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200697
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200951
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201027
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.26</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200885
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28207047
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28204857
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202111
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.29</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200845
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201553
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28202085
-http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28210339
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.24</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28201677
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.27</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28203953
</commentlist>
</conversation>
<conversation>
	<id>http://www.semanticweb.org/ontologies/ConversationInstances.owl#conversation09_06_03_1951209.28</id>
	<commentlist>http://www.semanticweb.org/ontologies/ConversationInstances.owl#comment09_06_03_1951209.28200909
</commentlist>
</conversation>
