Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

New USB Device Quickly Locates and Extracts Targeted Data From Computer Systems

USB Thumb Drive Designed for U.S. Government Cyber Security Missions Rapidly Probes, Identifies and Extracts Digital Computer Data, Leaving No Footprint

Looking to find and extract specific data quickly from a computer system without leaving a footprint behind?

USB Thumb Drive Designed for U.S. Government Cyber Security Missions Rapidly Probes, Identifies and Extracts Digital Computer Data, Leaving No Footprint

Looking to find and extract specific data quickly from a computer system without leaving a footprint behind?

Harris Corporation has introduced a highly customizable USB thumb drive which lets you do just that. The device – called BlackJack – is designed for military, intelligence, and law enforcement cyber security missions, where speed, stealth and accuracy are paramount considerations. It’s also a powerful tool for corporate computer forensics.

USB Data Extraction Tool

In order to execute a data extraction mission, users customize search criteria based on desired parameters set using Windows based software which prepares the device for the mission. Users then plug the BlackJack device into a computer USB port which initiates an automatic scan of all drives for matches to the predetermined search criteria. The device will then signal a red or green light instantly alerting the user to the results. BlackJack then copies and converges the search findings onto the device.

BlackJack can boot in less than three seconds and can automatically scan and copy data by prioritizing search criteria and securely partitions search results for analysis.

Headquartered in Melbourne, Florida, Harris approximately Corporation has $5 billion of annual revenue and more than 16,000 employees.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Cybercrime

The FBI dismantled the network of the prolific Hive ransomware gang and seized infrastructure in Los Angeles that was used for the operation.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Ransomware

The Hive ransomware website has been seized as part of an operation that involved law enforcement in 10 countries.