Police Magazine Logo
MenuMENU
SearchSEARCH

InfinaDyne CD/DVD Inspector 2.1

Nowadays it's easier to commit a crime with a computer than with a gun.

5 min to read


Nowadays it's easier to commit a crime with a computer than with a gun. That's why today's criminal investigators need both software and hardware tools that will help them analyze the content of seized computers, hard drives, CDs, and DVDs.

Once you take custody of a suspect's computer and any storage discs and external hard drives, the job falls to a computer forensics specialist who must catalog every file on the system. Fortunately for the good guys, computer crooks, despite their facility, with high-tech equipment, programming code, and the nooks and crannies of the Internet, tend to behave like all crooks.

Ad Loading...

For example, they like to keep trophies. Searches of their computers and their work areas often turn up all kinds of evidence of their "triumphs," including stolen codes, credit card numbers, viruses that they have written, and illegal pornography files.

Many computer crooks keep trophies the way many proud fishing enthusiasts or hunters do; they "mount" them. But instead of taking them to the local taxidermist and having them affixed to a plaque, the computer crook's form of mounting involves burning the "trophy" files to optical media (CDs or DVDs) that he can pop in his computer any time, show his friends, or just enjoy behind closed doors.

There are several reasons why hackers and assorted other computer bad guys like to keep their trophies on CDs and DVDs. For one, optical media are pretty permanent. Cared for properly, a CD or DVD can accurately store data for decades. Also, it's a way of organizing data that you may not want to keep on your hard drive. As one suspect once told me, "I wouldn't want all that 'stuff' clogging up my hard drive and slowing it down."

But there's another reason why bad guys like to store their trophies on optical media. Unless an investigator has the right expertise and the right tools to find hidden, deleted, and renamed files, a CD or DVD can be a safe place to store a trophy.

Fortunately, forensic computer experts are becoming more skilled and their software is getting better at finding these suspicious files. For example, one excellent tool for ferreting out evidence of a cyber criminal's misdeeds that may be stored on optical media is InfinaDyne's new version of CD/DVD Inspector.

Ad Loading...

Grayslake, Ill.-based InfinaDyne (formerly Arrowkey) has been writing software applications for reading and burning data to optical media discs for the past seven years. On the law enforcement side, the company's clients include the FBI and numerous local agencies nationwide.

Inspector's newest version (2.1) comes with a simple-to-use graphic user interface that allows intensive analysis and extraction of data. When I say "intensive," that's exactly what I mean. Inspector often can read a disc that other software has labeled as "unreadable." My advice is, don't believe it's unreadable until you let Inspector loose.

Inspector is so thorough because it knows what to look for and how to find it. It can gather information from the source material in all major CD/DVD file formatting systems, including ISO-9660, Joliet, UDF, HFS and HFT+, and is compatible with multiple operating systems and discs burned on both Macintosh and Windows systems.

The easy-to-understand displays describe the contents of the disc by folder, application icon, file name, and detail information, with or without MD5 hash (electronic "fingerprint" information for the disk or file). What this means is that when a suspect goes to the trouble of using multiple file systems to attempt to conceal incriminating data, "Inspector" uncovers that fact and reveals all the details. In addition, by right clicking on any object that Inspector finds, you can copy the file contents, see its properties, and display the sector contents just in case someone is trying to pull a fast one on you by renaming the file or hiding data in the slack space.

One of Inspector's best features is its ability to make a ZIP image of an entire CD. This "true copy" captures everything that ever was burned onto the subject disc, including files that are not listed in the directory, damaged files, and deleted files. That's bad news for crooks who think they can hide their nefarious activities merely by erasing the files.

Ad Loading...

Inspector also offers you some great shortcut features. A warrant to search a cyber criminal's office might yield hundreds of CDs and you may be seeking one specific piece of information, for example, an e-mail address. Inspector can search all files on the disc and all sectors on the disc for that e-mail address.

Also, with Inspector, you can search "inaccessible" discs for scan specification syntax. This is a great feature for any officer investigating a child pornography case because it lets you identify files containing graphic content regardless of their file extension. In other words, your local pervert can't hide his porn collection merely by removing the BMP, GIF, JPG, or TIF extensions because Inspector will tag them as image files regardless of their extension.

Inspector also features built-in tools found under its drop-down menus that run extensive analysis routines, providing vital information for forensic analysis. Unfortunately, InfinaDyne chose to display this information in an undersized dialog box that forces the user to manipulate the horizontal and vertical sliders to read it. But this dialog box has its good points as well. You can use the "Copy Text" button to copy the contents of the dialog box onto the clipboard, which allows you to paste it into any other appropriate application such as a word processor for making your report.

As a cop who actually has some hands-on forensic experience with computers, I give CD/DVD Inspector Version 2.1 a solid thumbs up for both its ease of use and its versatile analysis tools.

A 25-year police veteran, Bob Davis currently runs the San Diego Police Department's computer lab.

Subscribe to our newsletter

More Technology

Fans cheer at Saban Field at Bryant-Denny Stadium during a football game at The University of Alabama.
TechnologyApril 23, 2026

The University of Alabama Rolls Out Couter-Drone Technology

The University of Alabama is using D-Fend Solutions as a counter-drone technology supplier for campus and game-day airspace security. The University integrates D-Fend’s EnforceAir into its Emergency Operations Center (EOC), utilizing a unified command framework to collaborate with local, state, and federal partners during major events.

Read More →
Man working in front of multiple computer screens.
TechnologyApril 22, 2026

Motorola Solutions Now Part of the Cyber Threat Alliance

Motorola Solutions is now part of the Cyber Threat Alliance, the first formally organized nonprofit group of cybersecurity practitioners that work together in good faith to share threat information and improve global defenses against advanced cyber adversaries.

Read More →
Bar chart showing what police departments spend budget on for security.
TechnologyApril 22, 2026

Genetec 2026 State of Physical Security Report Reveals Public Safety Priorities & Challenges

Survey results from Genetec’s 2026 State of Physical Security Report highlight the demand for integrated systems that improve response times and reduce investigative workload. Nearly nine in 10 respondents said they use security data to help keep officers safe.

Read More →
Ad Loading...
Tinted blue background image of traffic with inset images for an ALPR camera, a police dispatcher, and a logo for Flock Safety.
TechnologyApril 16, 2026

Flock Safety Introduces Audit Assistance, Its Latest Trust & Compliance Tool

Audit Assistance is the latest tool in the Flock Trust & Compliance suite, a first-of-its-kind set of products and services that provides communities with guardrails and customization for accountability, transparency, and responsible use of the Flock platform.

Read More →
image of one closed laptop and one open laptop with Toughbook logo on screen, all against a blue gradient background
TechnologyApril 16, 2026

Panasonic Connect Launches the Toughbook 56

The Toughbook 56, the latest rugged laptop from Panasonic Connect, delivers enhanced performance, refined design, new levels of security, and power-efficient workflows in demanding environments.

Read More →
Collection of traffic control signs against a city backdrop and logos for Radarsign and Sourcewell.
TechnologyApril 16, 2026

Radarsign Awarded Sourcewell Contract Expanding Access to Traffic Safety Solutions

Radarsign’s traffic safety portfolio, including radar speed signs, flashing beacon systems, and more, are now available through Sourcewell purchasing contracts.

Read More →
Ad Loading...
Rooftop view off a drone detection devise with two small rubber antennas with an view overlooking a large domed event venue.
TechnologyApril 9, 2026

D-Fend Solutions’ EnforceAir C-UAS System Secures Key Event with RF-Cyber Counter-Drone Technology

D-Fend Solutions deployed its EnforceAir C-UAS system in support of local police to help secure a 19,000-attendee event, leveraging its non-jamming approach to keep communications and authorized drones operational while safeguarding against rogue drone threats.

Read More →
Graphic showing four priorities for secure enterprise cloud adoption and a logo for Genetec.
TechnologyApril 2, 2026

Genetec Highlights Why Governance Defines Secure Cloud Adoption in Enterprise Physical Security

With World Cloud Security Day on April 3, Genetec outlines how enterprises can strengthen resilience as they modernize physical security in the cloud.

Read More →
police car geotab thumbnail for services whitepaper
SponsoredApril 1, 2026

Police Fleet Management: Boost Performance & Savings

Today’s police departments face rising fleet costs and must stay ready to respond, no matter the call. In this eBook, get powerful insights to enhance your police fleet’s cost-efficiency, reliability and performance through data-driven tactics.

Read More →
Ad Loading...
An automated license plate reader mounted on rear trunk of a car.
TechnologyMarch 26, 2026

Public Safety Surveillance Technology: Built on Compliance and Trust

ALPR solutions provider Leonardo explains why leveraging technology for safety must never come at the expense of constitutional rights or community trust. Every action within an ALPR system should be logged in a tamper-proof audit trail with query records of who accessed what data, when, and for what purpose.

Read More →