The Covert Forensic Imaging Device “CFID” was designed for forward deployed military, intelligence, and law enforcement personnel who need a simple, small, portable and inconspicuous solution for imaging, cloning and wiping data from portable media such as USB and SD Cards. The CFID offers a battery powered multipurpose solution for the field and lab use.
At 1” deep, and with an outline smaller than a smartphone it is the smallest, easiest, and fastest way to collect in the field.
Thumb-Drives and SD cards present two of the most common forms of storage recovered today. While some computer and cell phone forensic tools are equipped to collect data from these media, a standalone tool dedicated to the task will improve efficiencies and free up processing power. Most importantly however, using a dedicated device will greatly simplify and speed up the process.
Forensically Image or Clone a device...All from the palm of your hand.
The CFID has four primary functions: Image, Clone, Format or Wipe, each executed through the simple touch screen interface. It captures the serial number and make model of each device encountered as well.
A suitcase is handheld. This handheld device fits in your hand.
Never containing any data, the CFID has no provision for storage. The tool pumps data from a source to a destination USB drive, while never storing any information itself. When imaging a device, the system creates a folder for each image acquired, and each folder is named with a reference number date-time stamp. The file can be split, compressed and hashed for as required for reference by the forensic examiner.
Keep It Simple
Data collection by field operatives can quickly become an increasingly complicated and time-consuming task. While a number of tools have been successfully deployed to capture data from various media types, the scope and quantity of devices being found warrants a better means of collection. We need a simple, covert and effective device for portable media acquisition.
The CFID can forensically image a 2GB USB memory stick, generate an EO1 evidence file and store the make/model/serial number along with the MD5 or SHA checksum for you.
There is no generic tool to suit every job.
But every job has a perfect tool...