USB Thumb Drive Designed for U.S. Government Cyber Security Missions Rapidly Probes, Identifies and Extracts Digital Computer Data, Leaving No Footprint
Looking to find and extract specific data quickly from a computer system without leaving a footprint behind?
Harris Corporation has introduced a highly customizable USB thumb drive which lets you do just that. The device – called BlackJack – is designed for military, intelligence, and law enforcement cyber security missions, where speed, stealth and accuracy are paramount considerations. It’s also a powerful tool for corporate computer forensics.
In order to execute a data extraction mission, users customize search criteria based on desired parameters set using Windows based software which prepares the device for the mission. Users then plug the BlackJack device into a computer USB port which initiates an automatic scan of all drives for matches to the predetermined search criteria. The device will then signal a red or green light instantly alerting the user to the results. BlackJack then copies and converges the search findings onto the device.
BlackJack can boot in less than three seconds and can automatically scan and copy data by prioritizing search criteria and securely partitions search results for analysis.
Headquartered in Melbourne, Florida, Harris approximately Corporation has $5 billion of annual revenue and more than 16,000 employees.

More from SecurityWeek News
- Threat Hunting Summit Virtual Event NOW LIVE
- Video: ESG – CISO’s Guide to an Emerging Risk Cornerstone
- Threat Modeling Firm IriusRisk Raises $29 Million
- SentinelOne Announces $100 Million Venture Fund
- Today: 2022 CISO Forum Virtual Event
- Cymulate Closes $70M Series D Funding Round
- SecurityWeek to Host CISO Forum Virtually September 13-14, 2022: Registration is Open
- Privilege Escalation Flaw Haunts VMware Tools
Latest News
- Industrial Giant ABB Confirms Ransomware Attack, Data Theft
- Organizations Worldwide Targeted in Rapidly Evolving Buhti Ransomware Operation
- Google Cloud Users Can Now Automate TLS Certificate Lifecycle
- Zyxel Firewalls Hacked by Mirai Botnet
- Watch Now: Threat Detection and Incident Response Virtual Summit
- NCC Group Releases Open Source Tools for Developers, Pentesters
- Memcyco Raises $10 Million in Seed Funding to Prevent Website Impersonation
- New Russia-Linked CosmicEnergy ICS Malware Could Disrupt Electric Grids
