<s>
Computer	B-Application
Online	I-Application
Forensic	I-Application
Evidence	I-Application
Extractor	I-Application
(	O
COFEE	B-Application
)	O
is	O
a	O
tool	O
kit	O
,	O
developed	O
by	O
Microsoft	O
,	O
to	O
help	O
computer	B-Device
forensic	O
investigators	O
extract	O
evidence	O
from	O
a	O
Windows	O
computer	B-Device
.	O
</s>
<s>
Installed	O
on	O
a	O
USB	B-Protocol
flash	O
drive	O
or	O
other	O
external	O
disk	O
drive	O
,	O
it	O
acts	O
as	O
an	O
automated	O
forensic	O
tool	O
during	O
a	O
live	O
analysis	O
.	O
</s>
<s>
Microsoft	O
provides	O
COFEE	B-Application
devices	O
and	O
online	O
technical	O
support	O
free	O
to	O
law	O
enforcement	O
agencies	O
.	O
</s>
<s>
COFEE	B-Application
was	O
developed	O
by	O
Anthony	O
Fung	O
,	O
a	O
former	O
Hong	O
Kong	O
police	O
officer	O
who	O
now	O
works	O
as	O
a	O
senior	O
investigator	O
on	O
Microsoft	O
's	O
Internet	O
Safety	O
Enforcement	O
Team	O
.	O
</s>
<s>
A	O
case	O
cited	O
by	O
Microsoft	O
in	O
April	O
2008	O
credits	O
COFEE	B-Application
as	O
being	O
crucial	O
in	O
a	O
New	O
Zealand	O
investigation	O
into	O
the	O
trafficking	O
of	O
child	O
pornography	O
,	O
producing	O
evidence	O
that	O
led	O
to	O
an	O
arrest	O
.	O
</s>
<s>
In	O
April	O
2009	O
Microsoft	O
and	O
Interpol	B-Device
signed	O
an	O
agreement	O
under	O
which	O
INTERPOL	B-Device
would	O
serve	O
as	O
principal	O
international	O
distributor	O
of	O
COFEE	B-Application
.	O
</s>
<s>
University	O
College	O
Dublin	O
's	O
Center	O
for	O
Cyber	O
Crime	O
Investigations	O
in	O
conjunction	O
with	O
Interpol	B-Device
develops	O
programs	O
for	O
training	O
forensic	O
experts	O
in	O
using	O
COFEE	B-Application
.	O
</s>
<s>
The	O
National	O
White	O
Collar	O
Crime	O
Center	O
has	O
been	O
licensed	O
by	O
Microsoft	O
to	O
be	O
the	O
sole	O
US	O
domestic	O
distributor	O
of	O
COFEE	B-Application
.	O
</s>
<s>
On	O
November	O
6	O
,	O
2009	O
,	O
copies	O
of	O
Microsoft	B-Application
COFEE	I-Application
were	O
leaked	O
onto	O
various	O
torrent	O
websites	O
.	O
</s>
<s>
Microsoft	O
confirmed	O
the	O
leak	O
;	O
however	O
a	O
spokesperson	O
for	O
the	O
firm	O
said	O
"	O
We	O
do	O
not	O
anticipate	O
the	O
possible	O
availability	O
of	O
COFEE	B-Application
for	O
cybercriminals	O
to	O
download	O
and	O
find	O
ways	O
to	O
‘	O
build	O
around	O
 '	O
to	O
be	O
a	O
significant	O
concern	O
"	O
.	O
</s>
<s>
The	O
device	O
is	O
activated	O
by	O
being	O
plugged	O
into	O
a	O
USB	B-Protocol
port	I-Protocol
.	O
</s>
<s>
First	O
COFEE	B-Application
is	O
configured	O
in	O
advance	O
with	O
an	O
investigator	O
selecting	O
the	O
data	O
they	O
wish	O
to	O
export	O
,	O
this	O
is	O
then	O
saved	O
to	O
a	O
USB	B-Protocol
device	I-Protocol
for	O
plugging	O
into	O
the	O
target	O
computer	B-Device
.	O
</s>
<s>
Estimates	O
cited	O
by	O
Microsoft	O
state	O
jobs	O
that	O
previously	O
took	O
3	O
–	O
4	O
hours	O
can	O
be	O
done	O
with	O
COFEE	B-Application
in	O
as	O
little	O
as	O
20	O
minutes	O
.	O
</s>
<s>
COFEE	B-Application
includes	O
tools	O
for	O
password	O
decryption	O
,	O
Internet	O
history	O
recovery	O
and	O
other	O
data	O
extraction	O
.	O
</s>
<s>
It	O
also	O
recovers	O
data	O
stored	O
in	O
volatile	B-Architecture
memory	I-Architecture
which	O
could	O
be	O
lost	O
if	O
the	O
computer	B-Device
were	O
shut	O
down	O
.	O
</s>
<s>
In	O
mid	O
to	O
late	O
2009	O
a	O
tool	O
named	O
Detect	O
and	O
Eliminate	O
Computer	B-Device
Acquired	O
Forensics	O
(	O
DECAF	O
)	O
was	O
announced	O
by	O
an	O
uninvolved	O
group	O
of	O
programmers	O
.	O
</s>
<s>
The	O
tool	O
would	O
reportedly	O
protect	O
computers	O
against	O
COFEE	B-Application
and	O
render	O
the	O
tool	O
ineffective	O
.	O
</s>
<s>
It	O
alleged	O
that	O
it	O
would	O
provide	O
real-time	O
monitoring	O
of	O
COFEE	B-Application
signatures	O
on	O
USB	B-Protocol
devices	I-Protocol
and	O
in	O
running	O
applications	O
and	O
that	O
when	O
a	O
COFEE	B-Application
signature	O
is	O
detected	O
,	O
DECAF	O
would	O
perform	O
numerous	O
user-defined	O
processes	O
.	O
</s>
<s>
These	O
included	O
COFEE	B-Application
log	O
clearing	O
,	O
ejecting	O
USB	B-Protocol
devices	I-Protocol
,	O
and	O
contamination	O
or	O
spoofing	O
of	O
MAC	O
addresses	O
.	O
</s>
