Commodore 64 Confuses Austrian Police 470
toomanyairmiles writes, "It seems that Wolfgang Priklopil, the communications technician who kidnapped Austrian pre-teen Natascha Kampusch, relied on a Commodore 64 as his primary machine. Interestingly this is presenting some problems to the Austrian computer forensics people. Major General Gerhard Lang of the Federal Criminal Investigations Bureau told reporters it would 'complicate investigators' efforts' and would be difficult to transfer the files to modern computers 'without loss.' Could this be the latest in the criminal world's security strategy? Can we expect to see Spectrums, Archimedes, and Atari STs turning up in police investigations soon?"
The Charge? (Score:5, Funny)
Re:The Charge? (Score:5, Funny)
Please read this before moderating parent as troll (Score:5, Interesting)
Question (Score:5, Interesting)
Um, no. This was an aberration; nothing more, even if its use for those reasons was deliberate on his part.
But here's an actual question:
I can absolutely understand and appreciate that people value some of the features and functionality of things like the Commodore 64 and Newton, and many other machines that were considered to be state-of-the-art in their time.
But why would someone go out of their way to continue to use it? I can understand practical and pragmatic answers like "It's still functional for me" or "I just like it better and I haven't had any problems". But are there other reasons?
I mean, you can literally get systems for free (or next to nothing) that are capable of running various modern operating systems, including various versions of Windows, Mac OS and Mac OS X, myriad Linux distributions to your heart's content, BSD distributions, and so on, that would be much more functional and capable, particularly in the context of the internet and associated applications.
So what's the draw? Why keep running on something like a Commodore 64? Even considering legitimate reasons for continuing to use it, I don't see how sticking with something exceedingly obsolete can be functional when viewed alongside semi-modern systems. I understand people collect all manner of antiques for a variety of reasons, including other things that may be nearly impossible to service or repair easily; is the reason for using obsolete computing equipment the same?
Status? Hobby? Entertainment? Eccentricity? Just to "do it"?
And to reiterate, I can understand collecting pristine Commodore 64s or similar in working order, and even making TCP/IP stacks and such work, just for the sake of doing it. But using it as a primary system exclusively? Some people may own and spend a great deal of time on something like, say, a Model T, but they don't use it as their daily driver...
On another note, I do agree that his system being a Commodore 64 will "complicate investigators' efforts"; but to say that it would be difficult to transfer files "without loss" is disingenuous at best. Do they mean "transfer files" to include possibly-deleted files (in which case I agree there may be "loss")? Do they mean contextual loss, because modern applications may or may not be able to open files and represent context-sensitive features like position, text styles, and so on? Or are they talking about "loss" in that they won't be able to run their standard forensic tools that package everything up with a nice little bow? If they're talking about files representing images and text, I don't care what it is: if it's functional and intact, there's no reason for there to be "loss". I don't care if it takes resorting to eBay, digging up old company engineers, or weirdos on web forums...they should be able to recover anything they need to.
Followup (Score:5, Interesting)
Commodore 64 has an RS-232 interface. (Score:3, Informative)
Re:Commodore 64 has an RS-232 interface. (Score:5, Informative)
Re:Commodore 64 has an RS-232 interface. (Score:4, Insightful)
Re: (Score:3, Informative)
Re:Commodore 64 has an RS-232 interface. (Score:5, Funny)
Re:Commodore 64 has an RS-232 interface. (Score:5, Interesting)
Re:Commodore 64 has an RS-232 interface. (Score:4, Informative)
What gets me is how none of the "experts" can handle anything that isn't a PC. I wounder if the guy had been running Linux, BSD, Minix, SkyOS, an Amiga, or Atari ST if they would be just as lost.
Here is a shop that sells cables that will let you read C64 disks on a PC http://sta.c64.org/x1541shop.html [c64.org]
I suggest they also google PETASCII if they want to break the encryption.
Re:Commodore 64 has an RS-232 interface. (Score:4, Insightful)
Personally I suspect the investigators just have a bunch of MCSE's who run prepackaged forensic tools and have never seen a C64 and don't know how one works.
Re:Commodore 64 has an RS-232 interface. (Score:4, Informative)
you'd be amazed how many Electronics and Computer technicians the RCMP up here is collecting. they've taken practically the entire graduating class of each (usually 20-30 people per course) for 2 years running at the school I'm at (SIAST).
but i don't have much idea what they're doing at the other 3 campuses, but I'd imagine similar things are happening, so that would be at least 150 techs they've snatched up, if not more.
Re:Commodore 64 has an RS-232 interface. (Score:5, Interesting)
Re: (Score:3, Informative)
Re: (Score:3, Informative)
Re:Commodore 64 has an RS-232 interface. (Score:5, Funny)
Re: (Score:3, Insightful)
Re:Followup (Score:5, Insightful)
Re:Followup (Score:5, Insightful)
except ... (Score:4, Insightful)
Except that those same media companies may in the future with high probability consider providing say Britney Spears' "tracks" (sorry, if I spelled her name wrong) for re-purchase as a "not interesting from operating profit point of view" thus consumers will be unable to repurchase thus they lose their beloved tracks. Or become criminals.
Feel free to replace "Britney Spears" with any other name from current "popular music" (or even past "popular music").
Re:except ... (Score:5, Funny)
Re: (Score:3, Insightful)
From the point of view of big media, this is not a problem. For them it suits them just fine. Unfortunately for the buying public this is a major issue.
Re:Followup (Score:4, Insightful)
I know the common thing to do is berate corporations for having no long-term vision - but the RIAA/MPAA/??AA do. They've perfected the technique of hovering around that fine line between "too fast, and people will notice" and "too slow, and we'll be obsoleted before we achieve our objectives".
Re: (Score:3, Insightful)
You do what everyone has done since the days of Edison's wax cylinders. You buy into whatever format is convenient and practical for the moment and let the archivists worry about preservation of the analog and digital masters.
Re:Followup (Score:5, Interesting)
When a company goes belly up, the law should stipulate that copy protection mechanisms can be legally circumvented
The DMCA already does this. See page 5 of this summary [copyright.gov], the part that talks about reverse engineering for compatibility.
Although not present in the summary, I believe (meaning I lost the original article) the DMCA also makes exceptions for cracking copy protection, such as a hardware dongle, on legitimately purchased software if the dongle no longer works and there's no real way to get another one. That section could also apply to what you're talking about.
Re: (Score:3)
The file format it converts into is readable by other programs as well as my machine, so there's no problem there.
Are you saying that it's actually legal for me to buy a cracked version of the software be
Re: (Score:2)
"And in the context of criminal investigations, what happens if evidence is "lost" (or simply unrecovered) from a 25-year-old computer in a murder investigation which has no statute of limitations?"
In the context of a criminal investigation I'd say take those situations as a case-by-case basis. If they want the case solved badly enough they will find a way to contract someone to develop hardware (or emulation?) that will read said data, or they will find a way to have tax-payers fund it. Either way, if
Re:Question (Score:5, Insightful)
Re: (Score:3)
Re: (Score:3, Insightful)
Re: (Score:3, Informative)
Re: (Score:3, Interesting)
My guess is that he got the machine thirty years ago, it did what he needed, and he never felt a need to replace it.
I still have a Macintosh SE that I dust off and use every now and then. I played around a bit with MusicWorks back in 1988. Sure, there are much better applications these days, but they don't read MusicWorks files, and converting those files to MIDI is a major pain in the ass that I haven't gotten around to yet. MusicWorks doesn't run on modern systems, so when I want to p
Re:Question (Score:4, Funny)
Exactly.
Coincidentally, he did the same with a girl, 10 years ago.
MY questions are: Why are people questioning the hardware choices of a psycho kidnapper? Are they actually looking for a coherent thought process they can relate too? Do they want to find one? Should they turn themselves in the nearest psychiatric ward if they do?
Re:Question (Score:5, Interesting)
And THAT'S how it's done.
RS
Re: (Score:3, Insightful)
Re:Question (Score:5, Insightful)
Re: (Score:3, Funny)
Re:Question (Score:5, Insightful)
Re:Question (Score:5, Funny)
On Slashdot, we don't think he's crazy for hideous crimes. We think he is crazy for using an old computer.
Re:Question (Score:4, Funny)
In the basement, I have an Altair that I kidnapped from the local uni 25 years ago, that I've been teaching to read Perl and play with Lego Mindstorms. I've named her "nappy", because she likes the nappies and ice cream. I feed it to her on punch cards. We are such a happy computer family together, I don't have to hit her much anymore. I love you, you love me, lalalalaOH SHIT THE COPS ARE HERE@!^&@!!
+++ATH
NO CARRIER
reason to use it in one word: (Score:4, Informative)
Re: (Score:2)
You just might be surprised. I know for certain that one of the ways of hiding sensitive data by many hackers, at least until a few years ago, involved using a C=64 datasette and one of the old school answering machines that used cassettes. Put your data on a cassette with the C=64 and then put the cassette inside of the answering machine. From here there are a lot of things you can do with it: one
Re: (Score:2)
Re:Question (Score:5, Funny)
But why would someone go out of their way to continue to use it?
Are you kidding? Obviously, because the hottest geek chick on the planet is into them! See:
"Super-hot super-smart geek-chick" [wikipedia.org]
Re: (Score:3, Insightful)
Re: (Score:3, Insightful)
I'm not sure what the outcome was, but I know they still have the C64 up and running in their office.
It does present some interesting complications, from what (little) I know about the forensic examina
Re: (Score:3, Funny)
Re: (Score:3, Interesting)
Re: (Score:2)
Re:Question (Score:5, Funny)
Re:battery life? (Score:5, Funny)
Of course, here's the funny story. I got the computer, and figured `ok, what do I do with it?' ... so I tried to remember BASIC, and put in this program as soon as I got it working at the office --
10 I = I + 1 ;
20 PRINT "HELLO THERE # ", I
30 GOTO 10
(sorry if I got this wrong. This is the last time I did any BASIC, and it was years before that that I'd last done any.)
In any event, it's still running today. It's up to (let me check) 509176235. It's doing roughly 4.2 iterations/second, with most of the cpu obviously going to scrolling the display. Of course, if I do the math, that only works out to about four years, so I'm not sure what the discrepancy is.
In any event, it's lasted several office moves, and now it's in my garage, with a wal-wart transformer connected and some AA's in the battery slot. The batteries will run it for a remarkably long time, and I just replace them every year or so.
I've been tempted to pull it out and play with it a bit, but I'm reluctant to lose all my uptime ...
Why go that far? (Score:5, Insightful)
Re: (Score:3, Informative)
Re:Why go that far? (Score:5, Informative)
Because in most forensic investigations, they remove the hard-drive from the PC and then perform the investigation using another operating system guaranteed to not have any nasty surprises built in. They're not going to run the risk that buddy has a small script that deletes his entire hard drive if he doesn't hit ctrl-a-s-d-f-enter within seconds of booting up.
There's likely more to it than that as well, but the point is they generally don't want to use the system they've confiscated...
Re: (Score:2)
Re: (Score:2)
Re:Why go that far? (Score:4, Insightful)
Not if you use an IDE cable with the write pins removed.
Re: (Score:3, Informative)
And here's a clue for you ...
You mount it in ext2 mode. ext3 is just ext2+journalling, and you can mount a ext3 partition as ext2. This doesn't replay the journal, so you won't get to see any data actually in the journal, but the rest of the data you can see. And there are other ways that you can ensure that Linux will not write to the
Re: (Score:3, Insightful)
Hah. It's amazing how modern computers have made us forget how little we used to have, and how much of it was proprietary as well. First, it's not ASCII, but PETSCII. Granted, the only serious difference is that lower and uppercase are swapped, but it's still worth noting. Second, T
Forensically accurate copies should be cake. (Score:3, Informative)
If they're too cheap to do that, an X1541 cable and a copy of Star Commander will work fine, plugged between the Commodore drive and a PC. This shouldn't be forensically valid, because the 1541 is a smart peripheral and could concievably be running a modified ROM.
Re:Why go that far? (Score:5, Insightful)
Quickly becoming a meme:
Only a terrorist wouldn't use Windows.
Re: (Score:3, Funny)
Only a terrorist wouldn't use Windows.
One man's linux zealot is another man's freedom fighter?
Re: (Score:2)
It's most likely because most people uses Windows? If the 60-70% of the world uses Mac, I'm sure most of the tools are Mac specific. Second, about "all their tools", did you just check out all the tools all police around the world uses? And we're talking about Commodore 64 here, not BSD/Linux or any of that sort. Coz if it is about BSD/Linux, there won't be such a news.
It's not that I
Re:Why go that far? (Score:4, Insightful)
You are far from correct. A lot of forensic investigators I have talked to actually use linux at times to do things such as image drives which is safer to do on linux than Windows and they are not straight Windows users.
Yep, all their tools are Windows-specific.
The reason they do use Windows tools most of the time is because the tried and true forensic applications are developed for Windows such as Forensic Toolkit Pro http://www.accessdata.com/products/ftk/ [accessdata.com] and EnCase http://www.guidancesoftware.com/products/ef_index
Windows may not be the greatest OS, and I know people love to bash it, but that does not mean the Windows tools developed for forensic investigations are of low quality. I work as a software developer in this field so I have a decent view on what the situation is and your comment was way far off.
Have they forgotten RS232? (Score:2, Informative)
There are emulators available which can make a modern PC capable of running Commodore 64 programmes but Maj Gen Lang said it would be difficult to transmit the data from Priklopil's machine to a modern computer "without loss".
What, have they forgotten how to create a DIN-5 to Sub-D9 cable? I'm sure google has several websites with the schematic of the machine (also available in the original user's manual), it shouldn't be THAT hard to construct an asynchronous serial cable.
FINALLY (Score:3, Funny)
Re: (Score:2)
let me at it!! (Score:4, Funny)
Space Taxi! (Score:2)
Oh, man. The flashbacks!
Even Better (Score:5, Funny)
C64 Data Cassettes (Score:3, Funny)
This is retarded (Score:5, Informative)
Re: (Score:2, Funny)
Quick! Volunteer your services as
Re: (Score:3, Insightful)
what kind of question is that? (Score:2)
Anyone planning this far ahead is just going to use steganography and hidden, encrypted volumes with a false, destructive 'duress' password.
Difficult but there are options (Score:2)
Once pulling the data off there are a number of great emulators such as Vice [viceteam.org] to run the software on. Or you could just buy one for less than $50 off of eBay.
Simple answer (Score:5, Funny)
Re:Simple answer (Score:5, Funny)
Thanks, that's exactly the thing that got us into this mess in the first place.
Attention perverts:
STOP Thinking of the children!
Forget security by obscurity... (Score:4, Interesting)
Really, if the raid happened 20 years ago, everyone would be able to get the info off those floppy disks. Now they've got to find a C64 user group or specialty store (how many of them are there, even on the net?) to transfer the data and convert it to a usable format.
Re: (Score:3, Funny)
Re:Forget security by obscurity... (Score:4, Funny)
He was probably looking forward to undeleting the contents of the drives. How long do you figure it took him to do so?
Hope you scrubbed them first.
abacus porn? (Score:2, Funny)
Only on slashdot... (Score:5, Funny)
missing the point (Score:5, Insightful)
Re: (Score:2)
At the end, I think they did (Score:2)
Here's how to do it :) (Score:3, Informative)
1. Use Star Commander or the equivalent program (ftp://ftp.zimmers.net/pub/cbm/archiving/c64/emut
2. Use PDS Hash Toolkit or some other approved toolkit to hash the disk images you've created.
They can also use 64hdd (www.64hdd.com), set it as drive #10, make directories on the partition they copy the files to, and then individually hash each file using PDS Hash Toolkit. You'll have to hash the 64hdd binaries as well.
If he's a really hardcore user of the C= series, I think the price of that SuperCPU on eBay just went up by a few hundred euro.
From TFA (Score:3, Funny)
Top Ten Reasons Why Austrian Police... (Score:3, Funny)
10.There's no USB port
9. Austrian govenment mandate that all computers must be able to play music from "The Sound of Music".
8. Investigators were at Oktoberfest the day they taught pre Windows XP forensics.
7. Unable to install popular folk dancing software on Commodore 64.
6. Jokes about the situation being hopeless but not serious in Austria have become true.
5. Police still worried about riots after UPC Arena name change.
4. There's no USB port
3. The floppy drive is WAY to big
2. The modem baud rate is slower than pooh
1. Can't copy and paste without a mouse
Arial??? (Score:5, Funny)
Comment removed (Score:5, Informative)
One comment... (Score:3, Funny)
Computer Forensics - clear as mud (Score:5, Informative)
Forensic investigators = not stupid
Article author/editor = selling a story / lack of facts
Court system = flaky justice
Being a computer forensic investigator, what I can tell you is that the problem is not with extracting individual files (being current, deleted, overwritten), or even hashing the contents or drive images themselves. Although this does present a certain technical challenge, this can be overcome. Any forensic investigator will tell you that, what he/she finds during his/hers investigation rarely comes under question or scrutiny. You just can not deny the fact that this "stuff" was found on the suspects media. What almost always comes under scrutiny is the technique used in obtaining the evidence. Where the police do have the tools and techniques that have been court tested for the relatively modern machines and OSes, there is no such tool or a battle tested procedure for capturing and processing data from the Commodore 64. That's what the challenge is all about. It's all about how do you get your evidence, and prevent the defence from shooting it down on a technicality that your approach was not forensically sound, because you have not used the court "approved" forensic tools and techniques. -- a side note: there are no court approved forensic tools, at least not in the USA. There are forensic tools that have gone through court scrutiny and been found to be acceptable, but only in conjunction with a proper forensic sound procedure. The tool is only a tool, like a hammer, it can be used to drive a nail into a wall, or crack someone's skull. Define a proper and sound use
Fear for retrocomputing (Score:4, Insightful)
No, what this means is that soon, anyone who owns or purchases an old piece of computing will either have to submit to a background check or be put on a DHS watchlist. Because there is no reason for a normal person to own an old piece of technology other than for nefarious purposes.
Re: (Score:3, Interesting)
Re: (Score:3, Informative)
Oh so very relevant... (Score:4, Insightful)
Marc Dutroux (the Belgian Paedophile) had several accomplices - one of whom was directly responsible for Julie and Melissa's death by not feeding them whilst Dutroux was in prison on another charge.
Re:Clues? How about relevance? (Score:4, Insightful)
Its one of those "without a trace" scenarios. Maybe the dead kidnapper has girls buried in basements all over Austria. You have to crack the C64 file system before they starve to death.