MediaClone
MediaClone SuperImager Plus 12" NVMe + SATA Portable Rugged Forensic Imaging Unit with Thunderbolt 4.0 Port
The SuperImager Plus 12" NVMe - SATA rugged portable Forensic Unit is configured with Dual Open OS of Linux for running multiple simultaneous parallels and independent of forensic imaging with extreme performances and Windows 11 for full forensic investigation, including Forensic Analysis, Triage, and Cellphone data extraction. The unit is Portable, Compact, easy to carry when traveling, has a large 12” display, and extremely performing hardware (NVMe 187GB/min). It is built with the latest generation of i7 CPU and with 2 NVMe U.2 ports (supports both U.2 and M.2), 2 SATA ports, 4 USB3.2 Gen2 ports, and one Thunderbolt 3.0 port (40 Gigabit/s) that enables the unit to expand or connect to 10GbE network.
Description
The unit hardware is very robust, running i7 13 generation CPU, the 12" large display helps visualization when running a full Forensic analysis software, and the rugged case makes it easy to carry when traveling.
Ports:
- one e-SATA port on the main unit
- 2 SATA ports: 2 on the main unit (in socket, power & data, but it is not supporting SAS )
- 2 NVMe ports: 2 U.2 NVMe ports on the main unit (power & data)
- 4 USB3.2 (10Gigabit/s)
- one USB3.2 Gen2x2 (20Gigabit/s)
- one TB4.0 port
One use of the unit is when there is a need to perform fast Forensic imaging onsite supporting SATA and NVMe in cross-media capture. Another use of the unit is to run cellphone data extraction, full forensic analysis, triage data capture, RAID reconstruction, network analysis
The unit supplied with:
- Remote Capture KIT.
- Virtual Emulator (for viewing the Suspect drive before capturing).
- 2 SATA Extension Cables.
- 2 U.2 Extension Cables.
- 2 U.2 to M.2 NVMe adapters.
The Thunderbolt port and the optional Thunderbolt Expansion box bring a lot of additional connectivity.
Important options:
Thunderbolt 3.0 to PCI-E Expansion Box, 4 Ports SAS controller, Thunderbolt 3.0 to 10GbE adapter, and Mac/Thunderbolt acquisition kit.
The unit’s fast Thunderbolt 4.0 (40 Gigabit/s) enables the user to capture data directly from Macbooks laptops via TB2, TB3, and 1394 connections. Also, the optional TB3.0 Expansion Box allows the user to capture data from other interfaces such SAS/SCSI/FC. The user can also use the unit' TB3.0 port to connect to 10 Gigabit/s networks and quickly upload the captured images to a network.
Some speed tests:
SATA to SATA Linux-DD copy max speed 32.7GB/min.
NVMe to NVMe mirror image max speed 187GB/min. (see pictures)
The SuperImager’s main application (the unit’s software) supports many imaging operations. Some of the tasks that the unit can be used for include:
- Multiple Parallel Forensic Capture: Mirror (bit by bit), Linux-DD, E01/Ex01 (with full compression) formats, Mixed-Format DD/E01, and Selective Capture (files and folders with the use of file extension filters). Select a single partition to capture.
- Erase data from Evidence drive - using DoD (ECE, E), Security Erase, NVMe, and Sanitize Erase protocols.
- View the data directly on the Ubuntu Desktop screen.
- Encrypt the data while capturing (AES256).
- HASH the data while capturing – run all the 4 MD5, SHA-1, SHA-2, and SHA512 HASH engines simultaneously.
- Run a quick Keyword Search on the Suspect drive before the capture.
- Run Multiple Cellphones/Tablets data Extraction and Analysis.
- Run a Forensic Triage application.
- Run a full Forensic Analysis application like Encase/Nuix/FTK.
- Run Virtual Drive Emulator.
- Run Remote Capture from unopened laptops (Intel Based CPU).
- Use the native Thunderbolt 3.0 port (40 Gigabit/s) to capture data from USB3.2 Gen2 storage devices, Mac via Thunderbolt 2/3 port or 1394 port, or connect to 10GbE network with the use of TB3.0 to 10GbE adapter.
- Unlock drives and capture with ATA passcode, BitLocker passcode, Opal passcode for SED drives, and VeraCrypt.
- Use the unit as a “Write Blocker” device: This new feature enables the SuperImager unit to function as a secure bridge between workstations on a network to Suspect drives attached to the SuperImager unit by using the iSCSI protocol over a network connection. A forensic investigator using a workstation or laptop in one location can access a Suspect drive in different locations in the Write block mode. The SuperImager unit will be connected to the same network, and the Suspect drives will be attached to the SuperImager unit in read-only mode. The SuperImager unit will act as a “write blocker” for any of the unit’s attached storage, such as SAS, SATA, USB, 1394, FC, SCSI, and NVMe.