Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Microsoft

FBI on the Windows Source Code Theft 504

Chris Gondek writes "There are various articles about the Stolen Windows Source Code, but today it is confirmed that an FBI task force hunted for a cyber-criminal who posted on the internet source code for Windows which says 'I can confirm that the Northwest Cybercrime Task Force was investigating, FBI spokeswoman Robbie Burroughs said. The posted program is part of the source codes, or blueprints, for Windows 2000 and Windows NT 4.0, according to the company.' "
This discussion has been archived. No new comments can be posted.

FBI on the Windows Source Code Theft

Comments Filter:
  • Re:Simple question (Score:5, Informative)

    by NeoThermic ( 732100 ) on Sunday February 15, 2004 @10:06AM (#8285181) Homepage Journal
    >> Can they track torrents?

    Only the source torrent, people who download from it are only anonymous if there are no logs kept, and even then, due to the way that it works, I doubt that it could be possible.

    Correct me if I'm wrong there...

    NeoThermic
  • well... (Score:5, Informative)

    by G27 Radio ( 78394 ) on Sunday February 15, 2004 @10:08AM (#8285199)
    Anyone that's a peer in the torrent has your IP address. All they have to do is connect to the torrent and start collecting IP addresses of any peer that sends a piece of the file.
  • Re:Simple question (Score:5, Informative)

    by Anonymous Coward on Sunday February 15, 2004 @10:17AM (#8285238)
    File: windows_2000_source_code.zip
    Key: CHK@JANQuMJMYGNWPVWyfwBwyXPsgBwPAwI,LeWue01uUKoEMG Kv54~o6A
    Bytes: 213748207

    CHK@JANQuMJMYGNWPVWyfwBwyXPsgBwPAwI,LeWue01uUKoE MG Kv54~o6A/windows_2000_source_code.zip

    Of course if you don't have Freenet yet (wtf are you waiting for?) you'd do good to visit http://www.freenetproject.org [freenetproject.org].
  • Re:Blueprints? (Score:3, Informative)

    by nickos ( 91443 ) on Sunday February 15, 2004 @10:20AM (#8285255)
    Hmm, maybe I should have quoted more of the article. He goes on to say:

    "These instructions have to be converted from the programming language in which they are written, like C or Java or C++ into a binary equivalent that the computer can understand, but that process is not analogous to building a house from blueprints - it's more like translating a book from one language into another."
  • Idiot world (Score:1, Informative)

    by Anonymous Coward on Sunday February 15, 2004 @10:20AM (#8285258)

    Why does a magazine called "PC World" write idioticisms like

    Source code is pre-compiled code in the form of lines of text, usually with comments. It can be compiled into code that can run but can't be read. The Windows code on users' PCs is all compiled code.
  • by Anonymous Coward on Sunday February 15, 2004 @10:29AM (#8285308)
    Among other things, the zip contains the source code to Notepad (you always wanted that!) along with an intriguing bugcodes.txt file that explains a lot of bluescreen/stop errors in more detail than you'll find anywhere else.

    File: windows_2000_source_code.zip
    Key: CHK@JANQuMJMYGNWPVWyfwBwyXPsgBwPAwI,LeWue01uUKoEMG Kv54~o6A
    Bytes: 213748207

    CHK@JANQuMJMYGNWPVWyfwBwyXPsgBwPAwI,LeWue01uUKoE MG Kv54~o6A/windows_2000_source_code.zip

    Of course if you don't have Freenet yet (what are you waiting for?) you'd do good to visit http://www.freenetproject.org [freenetproject.org].
  • by Anonymous Coward on Sunday February 15, 2004 @10:31AM (#8285323)
    ed2k://|file|MSDOS_6.0_Source_Code.zip|21107046|8F DE89245233B5F0501C6817BFF48C6C|/
  • by DustMagnet ( 453493 ) on Sunday February 15, 2004 @10:37AM (#8285356) Journal
    From http://discuss.washingtonpost.com/wp-srv/zforum/02 /sp_technews_charney091702.htm [washingtonpost.com]:
    Los Angeles, Calif.: Did you ever work for the FBI?

    Scott Charney: No, I worked for the Dept. of Justice as a prosecutor in the Criminal Division. The FBI is a different part of Justice.

  • by Anonymous Coward on Sunday February 15, 2004 @10:48AM (#8285403)
    NT4 (230 Mb)
    http://torrent.spyderlake.com/download.php?in fo_ha sh=66a26447f563c3dc2336de74ae37dc14d11dd8b9

    W2K (208 Mb)
    http://torrent.spyderlake.com/download.php?in fo_ha sh=f03fc1e04869294d5644d3c8c5d0fb8f2d26aa59
  • by Rostin ( 691447 ) on Sunday February 15, 2004 @10:51AM (#8285424)
    For some reason every limiting, nonsensical case is modded insightful. There is such a thing as culpability under the law. I think it's pretty obvious that if she really did intend to download something else (legally) and instead got the source code, she isn't guilty of anything, and could show that she really was tricked - say if she is none too computer saavy, has a demonstrable interest in cooking, etc. Notice that this is different than knowingly downloading the Windows source code and claiming that "I didn't know it was against the law." That is the genuine "ignorance of the law" for which there is no excuse. In the first case, something is happening to you that is really beyond your control. In the second, you are willingly and knowingly doing something that happens to be illegal.
  • by WIAKywbfatw ( 307557 ) on Sunday February 15, 2004 @10:58AM (#8285472) Journal
    It doesn't matter what I personally believe is right or wrong, the original poster wasn't talking about personal ethics, it matters what the law and the courts decide is right or wrong.

    If ever someone busts your ass for anything, whether it's an overdue library book or murder, feel free to knock on my door asking what I feel is right or wrong but don't expect the law to agree with everything I say.

    Rightly or wrongly, as I said before, ignorance is often no defence at all in the eyes of the law. If that offends you, well, I don't know what to suggest because that's pretty much standard practice everywhere on the planet.
  • by Anonymous Coward on Sunday February 15, 2004 @11:07AM (#8285522)
    Coca Cola Formula [port5.com]
  • Re:Scapegoat (Score:5, Informative)

    by SpaceLifeForm ( 228190 ) on Sunday February 15, 2004 @11:10AM (#8285548)
    Whoa. There is no proof that it was stolen/leaked from a Linux box at all. The file is question may have been assembled on a Linux box, and then copied to a Windows machine, and then stolen/leaked from there. Just because there is a core file from a Linux machine does not mean it was stolen/leaked from that same machine.
  • by telstar ( 236404 ) on Sunday February 15, 2004 @11:26AM (#8285641)
    According to BetaNews, a company called Mainsoft is to blame [betanews.com]. They allege that Mainsoft had access to the code in order to develop their Visual MainWin tool giving developers the ability to write Linux and Unix apps from within Visual Studio.
  • by telstar ( 236404 ) on Sunday February 15, 2004 @11:29AM (#8285661)
    Mainsoft had the following to say:

    • "Mainsoft has been a Microsoft partner since 1994, when we first entered a source code licensing agreement with Microsoft. Mainsoft takes Microsoft's and all our customers' security matters seriously, and we recognize the gravity of the situation.


    • We will cooperate fully with Microsoft and all authorities in their investigation.

      We are unable to issue any further statement or answer questions until we have more information.

      From Mike Gullard, Chairman of the Board, Mainsoft Corporation"
  • by zod1025 ( 189215 ) <`zod' `at' `modernwizardry.org'> on Sunday February 15, 2004 @11:44AM (#8285768) Homepage
    Or instead of little red flags, you should have a little light bulb light up that says "What a deal!".

    Downloading from the net is not illegal. Putting stuff on the net you don't have rights to is - but the downloaders aren't doing that. They are just accessing publicly available information.
  • by FictionPimp ( 712802 ) on Sunday February 15, 2004 @11:56AM (#8285837) Homepage
    Oh thats not always true. I bought items from a guy I worked with, in front of my boss. Turned out 6 weeks later the boss found out he was stealing them. I imediatly called the police and explained I had bought items from him and did not know they were stolen. Their response was to charge me with accessory, because in my state, having stolen property is the same as stealing it, even if you do not know its stolen. I had to do 200 hours community service, and lost the items, and the case in civil court to get my money back.
  • My pet hate... (Score:4, Informative)

    by sbaker ( 47485 ) on Sunday February 15, 2004 @12:33PM (#8286147) Homepage
    the source codes, or blueprints, Yuck! Please: Spokespersons from the FBI and people from the media - learn to say "code" not "codes". It's like the plural of sheep and hair is still sheep and hair. "codes" are encryption algorithms or something. And the source code for Windows is nothing like a blueprint. Source code is the actual thing we build - a blueprint is a guide for building the thing it describes. For software, the analogous thing to a blueprint would be something like a flowchart.
  • Re:Scapegoat (Score:3, Informative)

    by rekoil ( 168689 ) on Sunday February 15, 2004 @12:44PM (#8286220)
    Easier than that...just set up your wi-fi card to use a different MAC address from the burned-in MAC.
  • by HeghmoH ( 13204 ) on Sunday February 15, 2004 @12:52PM (#8286298) Homepage Journal
    There's no need to seed or download a torrent to get IPs from the tracker, it's totally separate. A normal BT client will get IPs from the tracker, and provide its own IP, then use that information to make connections and start downloading and uploading. It is trivial to connect to the tracker and ask it for the IP of everybody currently on that torrent, along with their status (seeding, downloading, how much progress). This is why using BT for illegal activity is extremely boneheaded. I doubt if the speed jump was related to MS's tracking, unless they were being stupid.
  • by Biffer4810 ( 217941 ) on Sunday February 15, 2004 @12:53PM (#8286307) Homepage
    For those whose assembly (DOS asm none the less!) is rusty, function 09 of int 21h is/was used to print a string to stdout.
  • by Anonymous Coward on Sunday February 15, 2004 @01:08PM (#8286458)
    Microsoft's Shared Source Initiative is pretty new, the leak is said to be from Mainsoft, which has had access to microsoft source code since 1994.. so yes they have had other programs to give out source code
  • by phoenix321 ( 734987 ) on Sunday February 15, 2004 @01:18PM (#8286558)
    Don't download that and please spread the word to other forums: This is a fake!

    Can be verified by a glimpse at the partially downloaded files: every part-file just consists of text lines saying this:

    "Rar!Fake!Hahaha!"

    A zillion times of course. So don't waste your time & bandwidth for that. If in doubt, download the first parts to see for yourselves...
  • by Anonymous Coward on Sunday February 15, 2004 @01:38PM (#8286755)
    Go look in /shell. Lots of messy code there.

  • Press Release (Score:2, Informative)

    by gagy ( 675425 ) on Sunday February 15, 2004 @01:47PM (#8286846) Homepage Journal
    Microsoft finally has something to say about this [microsoft.com].

  • Re:Precompiled code (Score:2, Informative)

    by Anonymous Coward on Sunday February 15, 2004 @01:58PM (#8286973)
    As I understood it. They (mainsoft, microsoft or whoever) published source code (not source codes but code!). Souce code is something that looks like:

    while(lax_us_laws && sheep_like_users)
    {
    find_devices();
    find_software();
    secretly_report_back_to_redmond();
    }
    ... the compiler turns this source code into assembly language, something that looks like:
    mov 0AH, 0x085a
    inc 0AH
    sub 0B
    jmp 0x05a


    ...the linker turns the assembly into:
    01001110000010101000010101110101011010101010

    So no, they didn't get pre-compiled code (pre-compiled code is assembly language software like the middle step above) so that is a lie (but like so many other things, journalists get very important technicals wrong, publish, and the clueless repeat what they read (and we all suffer).
  • by tjstork ( 137384 ) <todd DOT bandrowsky AT gmail DOT com> on Sunday February 15, 2004 @02:30PM (#8287249) Homepage Journal
    A blueprint is a set of instructions one gives to builders to make a building or a ship. In that sense, source code is a blueprint and the builders happen to be the compiler and the linker or interpreter.
  • MUTE 0.2.2 (Score:1, Informative)

    by Anonymous Coward on Sunday February 15, 2004 @03:51PM (#8287900)
    Try MUTE http://mute-net.sourceforge.net/ [sourceforge.net]

    Simple, anonymous, encrypted. I noticed the MS source code was available on the MUTE network yesterday.
  • by Anonymous Coward on Sunday February 15, 2004 @04:14PM (#8288057)

    Actually you can fake you IP partially (at least in ethernet). Just pick IP belonging to same local subnet so that trafic gets routed to your subnet and then grab packets with that IP.

    In practice, it's good idea to wait till some machine is down and then use temporarily free IP. This only works 100% if you know exactly when machine/IP will be down (so it cannot see trafic you generated) and if you can change your card's ethernet address to be also correct. One could also scan constantly to check if rightful owner of IP has become online again but in ethernet everyone can see the scanning.

  • by Keeper ( 56691 ) on Sunday February 15, 2004 @05:18PM (#8288500)
    The source was taken from a computer owned (at least at one point) by Mainsoft.
  • Re:Windows AQ (Score:1, Informative)

    by Anonymous Coward on Sunday February 15, 2004 @05:24PM (#8288538)
    Windows 2000, XP, and ME all have Windows File Protection. If you replace a system file, the OS is going to ask the user if he/she wants to restore it. All Microsofts system files are signed by Microsoft. The leaked source code doesnt contain Microsofts private key.
  • Re:Windows AQ (Score:3, Informative)

    by nick this ( 22998 ) on Sunday February 15, 2004 @05:42PM (#8288651) Journal
    It was always possible to do that. Just dump the exports of a .dll, make a new .dll with the same exports that merely hands them off to the old .dll.

    Insert whatever code you want before and after handoff to the old .dll. This was all trivially doable before, although its harder now with the File Protection crap in 2k and newer.

    It still comes down to the same thing. If you are running a binary system that's not signed with a trusted key, you are vulnerable. Period. This is as true with Linux as it is Windows. Access to source doesn't change anything.

    Besides, if you are running Windows, some terrorist plot to subvert your machine is the least of your problems. Trying to not get infected, 0wn3d, and bluescreened twice a day is a much larger concern. If you are running Windows, you clearly don't care about security anyway.

  • What this means is that most of the source code to Windows Explorer, and Internet Explorer are now effectively public domain.

    No, that isn't true. Under U.S. copyright law you own the copyright to something the minute it is created. If I write a song and never register it with the copyright office I still own the copyright and I can still sue over the unauthorized use of my work. Not placing a copyright notice makes it *difficult* to prove ownership but it doesn't make it impossible and it certainly doesn't mean it's now in the public domain.

    Additionally, do you really think that Microsoft (or any company in a similar situation) wouldn't simply go in and *add* the copyright notices to their source? It's a trivial matter and who do you think law enforcement will believe: a multi-billion dollar company who says "it was there all the time" or somebody who stole their code and is trying to save themselves from an IP suit? One of the most important things anyone in this situation can do is NOT to underestimate Microsoft. Multimillion dollar companies have done so in the past and many of them are no longer around. How do you think the average hacker will fair?

  • Re:Stupid article (Score:2, Informative)

    by _vapor ( 55645 ) on Sunday February 15, 2004 @09:23PM (#8290027) Homepage

    And he messed up the plurals again. It's source code now, but it "were public"...

    The writer's use of "were" is correct here. It is the past subjunctive form of "to be", used mostly in "if" clauses and to express hypotheticals.

    See The American Heritage(r) Book of English Usage [bartleby.com] for details.

"Gravitation cannot be held responsible for people falling in love." -- Albert Einstein

Working...