EX-1 Investigation Suite
EX-1 is a purpose-built laptop environment configured exclusively for mobile device data processing and forensic review. It operates without antivirus, sync services, or unnecessary software — ensuring nothing interferes with evidence handling.
All tools are run from USB. Nothing is installed on the system. The internal OS remains clean throughout operation, and all extracted data is stored externally. EX-1 is a contained, secure processing zone for digital investigators.
To maintain evidence integrity and operational security, EX-1 must only be used in isolation. No other external systems should connect to or interact with it during active processing. Internet access should remain disabled unless required for a defined task. This containment approach eliminates background threats, prevents remote interference, and supports clean audit trails across all extraction workflows.
The tools supplied within EX-1 are designed to extract and structure large, localised mobile datasets (LLM). These datasets form the foundation for deeper analysis using today’s modern forensic technologies. Whether investigators are converting communications into visual timelines, correlating media with location data, or exporting evidence into case management systems, the ability to reliably extract and isolate clean mobile data is the critical first step. EX-1 ensures that structured, review-ready datasets are always available for transformation, without compromise.
Key Features
- Controlled forensic environment (offline by default)
- No antivirus, no cloud sync, no background services
- All tools operate via USB — nothing touches the internal OS
- Lightweight and field-ready form factor
- Supports Python-based CSV processing (optional, manual)
- Built for mobile data extraction — not general-purpose computing
Evidence Handling Protocol
Operators are advised to store all case data on the provided 1TB external hard drive. This ensures the EX-1 internal system remains clean and stable across investigations. It also aligns with best-practice protocols for maintaining data separation, minimizing cross-case contamination, and preserving evidence integrity.
System Contents
EX-1 laptop (Windows OS – clean image, hardened configuration)
1TB external portable hard drive (USB 3.0, fast-write)
Digital Investigation Tools (delivered on USB):
Tool 1 – iPhone Data Extractor
Tool 2 – Android Data Extractor
Tool 3 – Photo & Video Backup Tool
Tool 4 – Cloakey Secure Browser & Encryptor
Tool 5 – Explicit Content Scanner
Tool 6 – Data Shredder Stick
Quick-start operator guide for setup and handling procedures
Legacy & Supplementary Tools
The following tools are included for completeness but are not central to most workflows:
SIM Card Seizure Tool (SCS)
A legacy utility for recovering deleted text messages and contacts from SIM cards. Retained for edge cases or legacy device investigations where SIM-level data may still be relevant.
Voicelogger Tool
Captures ambient audio from around the EX-1 and can auto-email recordings. Included as part of the original toolset. Not used in core mobile data workflows.
Professional User Cases
EX-1: Trusted by Professionals for Controlled, Repeatable Access to Digital Evidence
Law Enforcement & Investigators
For rapid mobile phone data extraction, evidence triage, and secure processing during field operations or lab-based reviews.
Internal Corporate Security Teams
To examine employee devices during audits, misconduct reviews, or data breach investigations — without contaminating internal systems.
Compliance & Audit Departments
For maintaining strict records of device-level activity in regulated industries. Ensures accurate data retrieval and tamper-free review environments.
Digital Risk & Insider Threat Units
Used to assess laptops and mobile devices in suspected IP theft, data leakage, or insider misconduct cases — with a clean forensic chain.
Legal & eDiscovery Professionals
To extract, isolate, and preserve digital content relevant to litigation, employment disputes, or HR investigations.
Private Sector Contractors (e.g. Financial, Medical, Tech)
For internal device audits, fraud detection, and case-specific mobile data reviews that require secure evidence environments and long-term traceability.
OFFLINE AI Development
Why EX-1 Aligns with the Future of Offline AI
A Shift in Sensitive Data Handling
The design of EX-1 reflects a growing shift in how sensitive data environments are handled — especially as artificial intelligence becomes more integrated into operational workflows. While many AI systems currently depend on live cloud access, there is now a decisive move toward offline AI models that respect data sovereignty, security policies, and chain-of-custody requirements.
An Architecture Built for Secure AI
EX-1’s architecture — clean OS, isolated processing, USB-only tool execution, and external evidence storage — creates a naturally compatible environment for contained, offline AI tools. These systems are designed to operate without external dependencies, offering advanced data analysis without pushing sensitive information into external networks or cloud platforms.
Structured Data for AI Transformation
From structured message extractions to media file libraries and metadata-rich logs, the data processed through EX-1 is well-formed and ideally suited for transformation by modern AI models — when deployed correctly. More importantly, the system’s strict evidence handling protocols mirror the same standards now being adopted by developers of offline AI tools for law enforcement, government, corporate security, and critical infrastructure.
Prepared for the Future
EX-1 doesn’t just process digital evidence — it prepares it for the future of secure, AI-assisted analysis.
Contained AI
The Importance of Contained (Offline) AI in Secure Data Environments
Introduction: The Rising Demand for AI, and the Risk
Artificial intelligence is rapidly becoming a critical tool in digital investigations, corporate compliance, and internal audits. From triaging massive data sets to identifying patterns in media, AI can dramatically reduce time-to-insight. However, the majority of AI solutions available today rely on live internet access and cloud-based models—which raises significant operational and security concerns.
Cloud AI tools expose sensitive data to third-party platforms, create audit trail gaps, and often violate internal data handling policies. For sectors that deal with confidential or regulated data, this is not acceptable. As a result, there’s a growing demand for offline, contained AI systems that bring the power of AI into secured environments—without the exposure.
What Is Contained (Offline) AI?
Contained AI, sometimes referred to as “offline AI,” is the deployment of machine learning models and automation tools within isolated environments that do not rely on internet connectivity. These systems:
- Operate entirely on local machines or closed networks
- Never transmit data to external servers or cloud services
- Can process, analyze, and learn from data in-place
- Are updated manually or via controlled file transfers
This structure ensures full control over the data lifecycle, supporting both operational efficiency and strict data governance.
Why It Matters: 6 Core Advantages
- Data Privacy: All evidence, communications, or case files remain within the secure environment. No data is exposed to cloud processing, third-party logging, or remote storage.
- Chain of Custody Integrity: Every action stays within the controlled system, preserving a clear and defensible audit trail from extraction to analysis.
- Operational Security: No internet connection means no risk of remote attacks, live threats, or automated updates introducing vulnerabilities.
- Policy Compliance: Offline AI supports strict security and privacy mandates in law enforcement, defense, healthcare, finance, and regulated corporate sectors.
- Predictable Performance: Local tools work consistently, unaffected by API limits, cloud outages, or changing subscription models.
- Expandable Locally: New models, scripts, and updates can be added securely using controlled devices like USBs or encrypted media.
Who Needs It
The use of contained AI isn’t limited to law enforcement or military applications. Many industries benefit from local AI analysis that never crosses network boundaries:
- Digital Investigators
- Corporate Security & Risk Teams
- Compliance & Audit Departments
- Legal & eDiscovery Professionals
- Government & Critical Infrastructure Agencies
- Finance and Healthcare Analysts
These users handle data that cannot be exposed, and offline AI allows them to automate analysis without compromising control.
Alignment with the EX-1 System
The EX-1 was designed for controlled evidence handling, and its architecture naturally aligns with the operational demands of offline AI. With all tools operating from USB, a clean OS install, no background services, and external evidence storage, EX-1 provides the kind of stability and isolation that offline AI systems require.
Structured outputs from the USB tools—including CSVs, media dumps, and logs—are ideal inputs for AI modules designed to operate within secure environments. No internet, no cloud, no risk. Systems like EX-1 represent a growing class of practical, isolated solutions built to meet modern digital processing demands without introducing exposure.
Future-Proof Thinking
The rise of offline AI solutions in forensics, cybersecurity, and regulated industries is already underway. As the field matures, systems like EX-1 will be well-positioned to adopt future local AI tools with minimal disruption. Containment is no longer just a security standard—it’s a foundation for next-generation analysis.
Technical Data
EX-1 Investigations Suite – Technical Specifications
System Overview
The EX-1 Investigations Suite is a secure, portable digital evidence processing environment designed for investigative and forensic workflows. It combines physical extraction tools, structured processing protocols, and an isolated laptop system.
Core Components
1. Digital Investigation Kit – USB-Based Tools
- Tool 1: iPhone Data Extractor – Retrieves primary data from iOS devices.
- Tool 2: Android Data Extractor – Extracts data from Android smartphones and tablets.
- Tool 3: Photo & Video Backup Tool – Scans and duplicates media files from suspect machines.
- Tool 4: Cloakey Secure Browser & Encryptor – Enables secure TOR browsing and encrypted storage.
- Tool 5: Explicit Content Scanner – Flags potential pornographic content using skin tone analysis.
- Tool 6: Data Shredder Stick – Permanently deletes files on Windows-based systems.
- Legacy Tool: SIM Card Seizure – Recovers deleted text messages from SIM cards.
- Supplementary Tool: Voicelogger – Captures ambient audio and emails recordings.
2. Processing System – Coolby Secure PC (BCL510 Model)
- Intel Celeron N5095 Quad-Core Processor
- 8GB DDR4 RAM
- 128GB SSD (expandable)
- 14.1″ HD Display (1366 x 768)
- Windows 11 Pro
- USB 3.2 / USB 2.0 / HDMI / MicroSD / 3.5mm audio
- Wi-Fi 5 + Bluetooth
- Built-in webcam with privacy shutter
3. Storage Device
- 1TB External Portable USB Hard Drive – Used for storing all extracted evidence, keeping internal system clean.
4. Accessories
- Laptop Bag: Protective transport case for the Coolby Secure PC
- Softshell USB Case: Organised storage and protection for USB-based tools
Warranty & Support
- Laptop Warranty: 2-Year Manufacturer Limited Warranty
- Battery Warranty: 1-Year Limited
- Support: Provided via official manufacturer channel
Usage Protocol
- EX-1 operates offline by default
- All tools run from USB – no installation on host system
- Evidence is stored externally to preserve system integrity
- Designed for field or lab-based investigations