Saturday, April 1, 2017

Meet the CIA’s Big Brother: The Multibillion Dollar US Spy Agency You’ve Never Heard Of


The National Geospatial-Intelligence Agency’s capability is well-equipped to quell the violence of protesters, assist ICE in their deportation corralling, and track all those who belong to minority groups – Muslims, Black Lives Matter..
If you haven’t heard of the NGA, you can be forgiven. The NGA – the National Geospatial-Intelligence Agency employs over 15,000 people in its shadows. The NGA is the cutting-edge spy agency that oversees the surveillance trade.
Forget the CIA and NSA. This newish acronymic organization – taking its new existence (started as the National Photographic Interpretation Center in WWII) in 2003 – is massive. Billions are granted for budget and in 2011, its main building measured “four football fields long and covers as much ground as two aircraft carriers,” costing $1.4 billion to complete.
James Bamford reported for Foreign Policy this month how even President Obama, five months into his presidency, didn’t know of this agency.
“So, what do you [do]?” Obama asked a customer at the Five Guys hamburger restaurant in Washington in May 2009.
“I work at NGA, National Geospatial-Intelligence Agency,” he answered.
Obama, astonished, asked “So, explain to me exactly what this National Geospatial …” unable to recall the agency’s full name.
Bamford reports that “eight years after that videotape aired, the NGA remains by far the most shadowy member of the Big Five spy agencies, which include the CIA and the National Security Agency.”

But What Exactly is NGA?

.
In 2016, the agency purchased 99 acres in St. Louis to construct additional buildings at a cost of $1.75 billion to accommodate the growing workforce, with 3,000 employees already in the city.
“The NGA is to pictures what the NSA is to voices. Its principal function is to analyze the billions of images and miles of video captured by drones in the Middle East and spy satellites circling the globe. But because it has largely kept its ultra-high-resolution cameras pointed away from the United States, according to a variety of studies, the agency has never been involved in domestic spy scandals like its two far more famous siblings, the CIA and the NSA. However, there’s reason to believe that this will change under President Donald Trump.”
Before the name switch to NGA, the agency was largely tasked with cartography. In 2003 it was reborn for the purpose of its current mission: satellite surveillance. They work closely with the U.S. Air Force, collecting and analyzing aerial surveillance through the use of drones and other unmanned systems. They play a crucial role in gathering US intelligence, including the intelligence gathering and replication of Bin-Laden’s compound for SEAL Team Six.
“How precise were its measurements and analysis? The NGA figured out how many people lived at the compound, their gender, and even their heights,” author David Brown said.
Located at the main headquarters in Ft. Belvoir, Virginia, the NGA has two additional facilities in Missouri and St. Louis at Scott Air Force Base. Ironically, Lt. Gen. James Clapper, better known for his position as the Under Secretary of Defense for Intelligence and Director of National Intelligence, arrived at NGA (then known as NIMA) only 2 days after 9/11 occurred. Clapper recalls his ‘transformative’ years with the agency:
“The events of 9/11 changed all that. It became clear to me and to the other senior leaders of NIMA that we did not have the luxury of implementing change over a prolonged period of time. We were at war and we needed to act immediately. So, we held a long weekend offsite at which we dramatically altered the organization and outlook of the Agency. In hindsight, this was exactly the right thing to do. Our nation, and our Agency, was fully engaged in a war and we had no choice but to focus on doing the best we could.” 
.

Should We be Worried?

Currently, the NGA is one agency set to benefit under the requested $70.3 billion laid out for the 2017 US Intelligence Community Budget. The Trump administration is set to bolster the amount, taking the total amount for the Pentagon’s 2017 fiscal budget to a whopping $541 billion. (The NGA falls under the Pentagon category as a “highly-classified Pentagon intelligence agency.”)
This leads to the worrying observation that the NGA may soon be granted more authority. The aerial system used against Iraq and Afghanistan may soon be used against the American people, Bamford reports:
“With the capability to watch an area of 10 or even 15 square miles at a time, it would take just two drones hovering over Manhattan to continuously observe and follow all outdoor human activity, night and day. It can zoom in on an object as small as a stick of butter on a plate and store up to 1 million terabytes of data a day. That capacity would allow analysts to look back in time over days, weeks, or months. Technology is in the works to enable drones to remain aloft for years at a time.”
The National Geospatial-Intelligence Agency’s capability is well-equipped to quell the violence of protesters, assist ICE in their deportation corralling, and track all those who belong to minority groups – Muslims, Black Lives Matter… It isn’t farfetched, Bamford says. The CIA and NSA’s evil brother is more than capable of assisting the Trump administration in their quest, and the lack of domestic overhead spying legislation that currently stands allows for just that.

10 WhatsApp Tricks And Hacks You Should Try Right Now

Top 8 Best WhatsApp Tips And Tricks Of 2016 10
WhatsApp is one of the applications which has been downloaded and used by millions across the globe. It made a stand-out in connecting people and due to its popularity, Facebook was forced to buy the whole company for billions. After Facebook-owned the company, there are latest updates which changed the interface with new features, from which people are still unaware. WhatsApp tricks or WhatsApp tricks and tips is one of the most searched topics across the search engines as people wants it to make more compatible and easy to use. There are many WhatsApp tricks available which give you options beyond the limits and variety to choose from.

10 WhatsApp Tricks and Hacks you should try right now

1. Saving group Images

Save group images
WhatsApp allows you to transfer hundreds of images and videos across the single or in group chat. With sharing, you to receive repeated messages with media which gets stored in the internal or external memory of your smartphone. With this new feature, one of the famous WhatsApp tricks allows you stop downloading images unless you want it. Go to Options >Settings > Data Usage. Under Media auto-download, uncheck all the boxes and now you need to manually download any image or video of your choice.

2. Always choose your friend list

Always choose your friend list
Within the group chats, there are many people who are strangers to you and you want to maintain your privacy with limitations on your profile photo and even your status. With the help of WhatsApp tricks and tips, you can be under the hood with limited information. Click on Settings >Privacy and within the privacy option, you can choose from your Last seen, Profile photo and Status. You can also choose to shares this information from Everyone, My contacts, and nobody.

3. Just Mute It

Just Mute It
At times it feels annoying for receiving continuous messages in a group chat even when you are not online and you can’t exit the group because you have created it. It is the situation which was created by you and now you have to suffer but to avoid such situations you can tap on the group chat and in the info you get an option to mute the chat for minimum 8 hours to 1 year straight. And to get rid of it completely you can just exit the group.

4. Make it Private

Make it Private
You do have many friends on Facebook but you only wants few of them to join you for an upcoming event or on a night out. From many WhatsApp tricks and tips, this special one will work as our personal email assistant who will send a quick message to your selected contacts. On the top-left hand corner of your WhatsApp Chats window, you will notice a Broadcast Lists. Within this option, you can select contacts and create a new list to send your message.

5. Create Shortcuts

Create Shortcuts
Just like a speed dial to your constant contacts, you can also create shortcuts for you WhatsApp buddies on the home screen of your smartphone and with just one tap, you will be directed to the window of that person. Select the loved one and long press on the conversation you want to create a shortcut for and select Add chat shortcut from the pop-up menu.

6. Sleep and Message

Sleep and Message
Sleep and Message
You want to wish a ‘Happy Birthday’ to your loved one at 12 midnight but you slept just minutes before. To avoid such situations, you can download a third-party application that supports WhatsApp for scheduled messages. For all Android devices download Seebye Scheduler ROOT and for iOS devices look for Message Scheduler for WhatsApp.

7. Keep them Away

Keep them Away
It is considered to be one of the best WhatsApp tricks and tips as it allows you to lock the application which will keep away your personal messages from your parents and even your loved ones. It is again supported by the third-party application which can be downloaded on all Android and iOS devices.

8. Customize it

Customize it
At times it feels boring to see the same WhatsApp background which makes it dull and pain for your eyes. Now you can choose any image which is provided by the application or from your own library. Click on Options >Settings > Chats > Wallpaper and Add images to your life.

9. Straight to it

Straight to it
It is a tedious job when you have to look for an important but an old message, phone number or even email address. With the new update, now you can save your time with built-in feature of WhatsApp to search. Click on Options > Search, enter some words from the message and you will get the list to select from.

10. Make it your favourite

 Make it your favourite
There is a list of important people and messages that you receive on daily basis, to make them feel more important, you can starred them. With this option, all the messages from selected contacts will be in the different window and it will be easier for to read and reply to them.
These are some WhatsApp tips and tricks which can use to make your friends jealous about your efficiency and intelligence.

How to Rank Any Youtube Video On Google in Just 3 Days With Tube Jacker

How to Rank Any Youtube Video On Google in Just 3 Days With Tube Jacker


Here we are sharing a case study with the help of that you can learn that How to Rank Any Youtube Video On Google in Just 3 Days With Tube Jacker.
Online video is completely exploding & continues to be one of the most powerful methods of establishing and promoting a brand while securing permanent traffic from all of the major search engines. On the Internet the most popular video community is YouTube community, there are about 60 hours of video uploaded every minute. Think about that how good is this. It is equal to one hour of video content uploaded per second. It is estimated that by 2015 year, at least 90% of all Internet traffic will be video-based.
Big Companies like Cisco and major ISPs are working around the clock to develop new technologies that can be adapted to handle such a tremendous amount of bandwidth, as current technology is not prepared for it. YouTube is the 4th most popular website in the world & gets a huge amount of traffic every day. If you are not using this video powerhouse for marketing, you are missing out on a huge source of high quality, exceptionally targeted free traffic. So what you are waiting for instantly download the case study about How to Rank Any Youtube Video On Google in Just 3 Days With Tube Jacker and jump into this trending era.
How to Rank Any Youtube Video On Google in Just 3 Days With Tube Jacker

Rank Any Youtube Video On Google in Just 3 Days With Tube Jacker

File Size: 645 KB
Price: Free
Download

How To Make A Bootable Kali Linux USB With Persistence

How to make a bootable Kali Linux 2.0 USB with persistence. Persistence means that all the data changes that take place while you are using the system, they will be saved on the usb / pendrive that you Linux is in.

Reasons For Using Live USB With Persistence Are:

·You use all of your system resources eg. CPU, RAM, GPU, etc
·You take no space of your Hard Drive for it.
· You can take your OS to any PC you use.

Requirements:

Universal USB Installer : http://www.pendrivelinux.com/universal-usb-installer-easy-as-1-2-3/
Kali Linux Image : https://www.kali.org/downloads/
MiniTool Partition Wizard : www.partitionwizard.com

Step 1:

Watch The Video On How To Make The Persistence USB Or Follow The Steps  

Step 2: Steps On How To Do It

1. You Need To Use The Universal USB Installer To Put Kali On The USB.

2. You Need To Partition The USB, to create the partition for the data storage.

Pick this options:
· Create as: Primary · File System: Ext4 · Partition Label: persistence.

3. You Need To Boot Into Kali Linux and execute these commands in the terminal
Commands

  1. fdisk -l -To List Your Drives
  2. mkdir -p /mnt/UUI -Make a directory on the filesystem to mount your USB
  3. mount /dev/sdb2 /mnt/UUI -Mount the partition on the directory you made
  4. echo "/ union"> /mnt/UUI/persistence.conf - Adds a configuration file to enable persistence.
  5. umount /dev/sdb2 && reboot Unmount the partition and reboot.

Configaration Of Computers Used In Forensics In Criminal Investigation

Computer forensics integrates the fields of computer science and law to investigate crime. For digital evidence to be legally admissible in court, investigators must follow proper legal procedures when recovering and analyzing data from computer systems. Unfortunately, laws written before the era of computer forensics are often outdated and cannot adequately assess the techniques used in a computer system search. The inability of the law to keep pace with technological advancements may ultimately limit the use of computer forensics evidence in court. Privacy advocates are growing especially concerned that computer searches may be a breach of a suspect’s human rights. Furthermore, as methods for encryption and anonymity grow more advanced, technology may be abused by helping criminals hide their actions. Ultimately, the role of technology in computer forensics may not reach its full potential due to legal boundaries and potential malicious intentions.

Computer forensics has been indispensable in the conviction of many well-known criminals, including terrorists, sexual predators, and murderers. Terrorist organizations may use the Internet to recruit members, and sexual predators may use social networking sites to stalk potential victims. However, most criminals fail to cover their tracks when using technology to implement their crimes. They fail to realize that computer files and data remain on their hard drive even when deleted, allowing investigators to track their criminal activity. Even if criminals delete their incriminating files, the data remains in a binary format due to “data remanence” or the residual representation of data (1). File deletion merely renames the file and hides it from the user; the original file can still be recovered (2).

Eventually, data may be overwritten and lost due to the volatile nature of memory, a storage area for used data. A random access memory chip (RAM) retrieves data from memory to help programs to run more efficiently. However, each time a computer is switched on, the RAM loses some of its stored data. Therefore, RAM is referred to as volatile memory, while data preserved in a hard drive is known as persistent memory. The RAM is constantly swapping seldom used data to the hard drive to open up space in memory for newer data. Over time, though, the contents in the swap file may also be overwritten. Thus, investigators may lose more evidence the longer they wait since computer data does not persist indefinitely. Fortunately, computer scientists have engineered equipment that can copy the computer’s contents without turning on the machine. The contents can then be safely used by lawyers and detectives for analysis (2).

Global Position System (GPS) software embedded in smartphones and satellite navigation (satnav) systems can also aid prosecutors by tracking the whereabouts of a suspect. Since companies that develop software for computer forensics also develop products for satellite navigators, they are well-equipped with the tools and technology necessary for acquiring GPS evidence.

However, the evidence that can be recovered from GPS software is limited to only a list of addresses. Current GPS software does not record the time when the address was archived, whether the address was inputted by a person or automatically recorded, or whether the owner’s intent for entering the address was associated with the crime. Despite these limitations, GPS evidence has still been crucial to the success of many prosecutions. In one famous example, four armed suspects accused of robbing a bank in the United Kingdom were convicted because each suspect owned a vehicle whose satnav held incriminating evidence, including the bank’s address and the addresses of the other three suspects. The Scottish National High-Tech Crime Unit searched a suspect’s TomTom, a GPS device, to obtain thousands of addresses that the vehicle passed by. Many of the addresses turned out to be the scenes of criminal offenses (3). In 2011, U.S. forces successfully found the Pakistani compound where Osama bin Laden was killed by tracking satellite phone calls made by his bodyguard (4).

While GPS evidence on its own may not be enough to establish a motive, GPS evidence can still provide invaluable leads or confirm a hunch. For example, contact lists, language preferences, and settings all may be used to establish a suspect’s identity or identify accomplices. Evidence from GPS software and mobile devices can be a valuable supplement to other forms of evidence (3).

Some criminals have grown more cautious by hiding incriminating data through encryption techniques. However, according to Andy Spruill, senior director of risk management for Guidance Software, most criminals “don’t have the knowledge or patience to implement [encryption software] on a continued-use basis.” The minority of criminals who do encrypt their files may only use partial encryption. If only a few files on a hard drive are encrypted, investigators can analyze unencrypted copies found elsewhere on the device to find the information they are seeking. Furthermore, since most computer users tend to reuse passwords, investigators can locate passwords in more easily decipherable formats to gain access to protected files. Computer data are also oftentimes redundant – Microsoft Word makes copies each time a document is modified so that deleting the document may not permanently remove it from the hard drive. With so many forms of back-up, it is difficult for criminals to completely delete incriminating computer evidence (5).

While investigators can exploit computer system glitches to obtain evidence, technological limitations can often compromise a computer search. A common protocol for handling a mobile device found at a crime scene is to turn the power off. Investigators want to preserve the battery and prevent an outside source from using the remote wipe feature on the phone’s contents. When the phone is turned off, the phone cannot receive text messages and other data that may overwrite the evidence currently stored in the device. However, turning off the device has its own consequences, potentially causing data to be lost and downloaded files to be corrupted (1).

To solve such problems, computer engineers have developed technology for shielding a device from connecting to a cellular carrier’s network. Computer forensic scientists no longer need to turn off the device to isolate it. For example, radio frequency (RF) shielded test enclosure boxes help keep signals from entering or leaving the device. A Faraday bag, used in conjunction with conductive mesh, can also isolate a mobile device. Using these techniques, investigators can safely transport mobile devices to the lab while the device is turned on (1).

However, GPS software and Faraday bags are not foolproof. A cell phone isolated in a Faraday bag may adamantly search for a signal, depleting the phone’s battery power. When searching for a network, cell phones are also losing data (1).
Radio frequency bag with iPhone inside for reducing data loss. These bags keep radio signals from entering or leaving the device. Courtesy of Wikimedia.
According to Professor David
Last of University of Bangor, Wales, errors in locating signals may range up to 300 meters when obstructions are present. While “95 percent of [GPS] measurements fall within 5 metres of the true position” in clear and open areas, large geographical barriers and skyscrapers may severely block and reflect satellite signals. Interference from solar weather may also disrupt signals. Criminals even purposely use jammers to disrupt tracking systems. Investigators must carefully audit communications channels and monitoring systems used in tracking systems. In doing so, they can better avoid skepticism from the jury by being able to give a clearer and more precise estimate of the amount of error afflicting GPS measurements. Otherwise, the defense can suppress the GPS evidence if the measurements are significantly faulty and unreliable (3).

While the Fourth and Fifth Amendments were written long before the era of computers, both concepts still apply to the practice of computer forensics. The amendments serve to protect basic human rights by preventing unreasonable search and seizure and self-incrimination. In the case of United States v. Finley, the defendant claimed that ”a cell phone was analogous to a closed container,” suggesting that investigators should exercise the same restraint and caution in searching cell phones as they would in a bag or a private home. Generally, investigators must first obtain a search warrant, which is typically given by the court in order to obtain and preserve evidence that can be easily destroyed (1). However, exceptions to the rule have been observed in United States v. Ortiz; investigators legally retrieved telephone numbers of “finite memory” from a suspect’s pager without a warrant because the contents of the pager can be easily altered when incoming messages overwrite currently stored data. Searches without a warrant “incident to arrest” are permissible because they help to prevent fragile data of evidentiary value from being lost (6). They consist mostly of scanning the device’s contents using the keyboard and menu options. More advanced searches incident to arrest may include the use of a mobile lab, which allows for the immediate download of cellular phone data (7). However, according to United States v. Curry, searches “incident to arrest” can only be conducted “substantially contemporaneous with the arrest” (1). If investigators want to conduct further post-arrest forensic analysis, proper legal authorization must first be obtained (7).

Proper legal procedures are often vague and burdensome for investigators, especially since laws may vary from state to state. Some states may have a stricter policy regarding warrantless searches. In United States v. Park, the court ruled that since cell phones can hold a greater quantity of data than pagers, its contents are less likely to be lost; a warrantless cell phone search is thus unnecessary and unjustified. Similarly, in United States v. Wall, the court decided that “searching through information stored on a cell phone is analogous to a search of a sealed letter” (6). Even if investigators manage to obtain a search warrant, the evidence they find may still be suppressed if their forensic procedures fail to follow legal procedures. For example, looking through unopened mail and unread texts or not carefully documenting the chain of custody may constitute an improper search (1). With so many boundaries and inconsistencies in the legal system, it is often difficult for investigators to successfully perform their jobs.

Different state and national legal systems plague computer forensics as well. When an Estonian was charged with computer crimes in 2007, Russia refused to provide legal cooperation because it had not criminalized computer crimes yet. Russia received severe Distributed Denial of Service attacks for its lack of cooperation (8).

In addition to a faulty legal system, the accessibility of advanced technology may be afflicting computer forensics. The North Atlantic Treaty Organization (NATO) defines cyber terrorism as “a cyber attack using or exploiting computer or communication networks to cause sufficient destruction to generate fear or to intimidate a society into an ideological goal” (8) As computer systems grow more powerful, criminals may also abuse computer systems to commit crimes such as software theft, terrorism, and sexual harassment (9). For example, stalkers can abuse the Tor Project, an anonymizing tool for victims of cybercrimes to safely report abuses, to instead hide their identities when they commit crimes of harassment. The technology is too advanced for the digital trail of cybercrimes to be tracked. As encryption programs grow stronger and more popular, forensic investigators may no longer be able to decode the hidden digital evidence.

Conclusion

For computer forensics to progress, the law must keep pace with technological advancements. Clear and consistent legal procedures regarding computer system searches must be developed so that police and investigators can be properly trained. An International Code of Ethics for Cyber Crime and Cyber Terrorism should also be established to develop protocols for “obtaining and preserving evidence, maintaining the chain of custody of that evidence across borders,” and “clear[ing] up any difference in language issues.” Following these measures may be the first steps to resolving the technological and legal limitations afflicting computer forensics. Interpol, the International Criminal Police Organization, has developed a Computer Crime Manual with “training courses” and “a rapid information exchange system” that serves as a foundation for international cooperation (8). Lastly, the criminal abuse of technology can be limited by equipping the police department with state-of-the-art training and equipment for forensic analysis. Only then is the world safely prepared to face the future of technology. As one author predicts, “the next world war will be fought with bits and bytes, not bullets and bombs” (8).


References

1. D. Bennett, The Challenges Facing Computer Forensics Investigators in Obtaining Information from Mobile Devices for Use in Criminal Investigations (2011). Available at http://articles.forensicfocus.com/2011/08/22/the-challenges-facing-computer-forensics-investigators-in-obtaining-information-from-mobile-devices-for-use-in-criminal-investigations (29 December 2012).

2. Computer Crimes. Available at http://library.thinkquest.org/04oct/00206/cos_computer_crimes.htm (29 December 2012).

3. D. Last, Computer Analysts and Experts – Making the Most of GPS Evidence (2012). Available at http://articles.forensicfocus.com/2012/08/27/computer-analysts-and-experts-making-the-most-of-gps-evidence (29 December 2012).

4. O. Tohid, Bin Laden bodyguard’s satellite phone calls helped lead US forces to hiding place (2011). Available at http://www.csmonitor.com/World/Asia-South-Central/2011/0502/Bin-Laden-bodyguard-s-satellite-phone-calls-helped-lead-US-forces-to-hiding-place (29 December 2012).

5. A. Spruill, Digital Forensics and Encryption. Available at http://www.evidencemagazine.com/index.php?option=com_content&task=view&id=656 (29 December 2012).

6. C. Milazzo, Searching Cell Phones Incident to Arrest: 2009 Update (2009). Available at http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display&issue_id=52009&category_ID=3 (29 December 2012).

7. D. Lewis, Examining Cellular Phones and Handheld Devices (2012). Available at www.dfinews.com/article/examining-cellular-phones-and-handheld-devices?page=0,1 (29 December 2012).

8. B. Hoyte, The need for Transnational and State-Sponsored Cyber Terrorism Laws and Code of Ethics (2012). Available at http://articles.forensicfocus.com/2012/09/28/the-need-for-transnational-and-state-sponsored-cyber-terrorism-laws-and-code-of-ethics (29 December 2012).

9. M. Chasta, Android Forensics (2012). Available at http://articles.forensicfocus.com/2012/09/12/android-forensics (29 December 2012).

How to create a MultiBoot USB flash drive by putting multiple ISO files on one bootable USB stick


How To Install Multiple Bootable Operating Systems on One USB Stick

A bootable USB flash drive comes handy when if you have problems with your operating system,  mostly when you are facing the dreaded Blue Screen of Death screen again and again. The option of having a bootable version of your operating system helps you to isolate the software issues with your PC/laptop. Further, almost all operating systems make it very easy to put ISO files on portable flash drives by using various tools. For example, the Windows USB/DVD tool and the Startup Disk Creator in Ubuntu.
While having a USB pen drive with a single operating system may come in handy if you are a non-technical person, there are many of us out there who need multiple instances of operating systems to test various software. With so many OS available in the market, it is not worthwhile to keep a separate USB pen drive for each and every one of them.  It would be great if you put all the ISO files on one flash drive and take the advantage of installing multiple operating systems through a single multiboot USB flash drive.
So, in this article, we are going to take a look at how you can put multiple ISO files on a single USB stick and create a multiboot USB pendrive. Since most ISOs are resource heavy, your flash drive must but of at least 16GB or 32GB capacity. For instance, putting three Windows ISOs in the multiboot USB disk, you will need a 16GB flash drive.
At the heart of installing multiple ISO files on your USB stick lies a popular tool called WinSetupFromUSB. This tool allows you put multiple ISOs in one installation disk. You can put Windows and Linux in a same bootable disk or create a master boot drive with Windows 7, Windows 8.1, and Windows 10 operating system.
You can refer this article for installing any version of Windows on PC from USB. Before proceeding with the method, if you don’t have the ISO files for Windows OS, this link would guide you through the process to download them legally.

Now let us get down to the business of installing multiple ISO files of different operating systems on a single USB pen drive.

How to install an ISO file of any operating system on a USB stick

  • Download WinSetupFromUSB and extract the software on your PC/laptop.
  • Connect your USB stick to your PC/laptop.
  • Open WinSetupFromUSB. Open the 32-bit and 64-bit version according to your OS.
  • Select your USB stick from the drop down menu. If the software doesn’t recognise your pen drive, press refresh.
  • Tick Auto format it with FBinst. Remember you have to choose this option only during the first ISO installation.
Now let us get down to the business of installing multiple ISO files of different operating systems on a single USB pen drive.
  • Now click on Advanced options and select Custom menu names for Vista/7/8/Server Source checkbox. Click the Cross (X) button to exit Advanced Options.
Now let us get down to the business of installing multiple ISO files of different operating systems on a single USB pen drive.
  • Now come back to the main screen of the App and select the checkbox of the OS you want to install on your USB stick. Note: If the size of your ISO is larger than 4 Gb, it will show a message to split the file into parts. This is because you’ve chosen the FAT32 option. Click OK.
  • Press GO. That’s it. The software will now format your pen drive and install the ISO that you have selected.

How to install second bootable ISO file of any operating system on that same USB pen drive

  • Start the WinSetupFromUSB tool again.
  • Select your flash drive in the drop down menu.
  • Click Advanced Options and look for Custom menu names for Vista/7/8/10/Server Source.
  • During second ISO installation, kindly uncheck Auto format with FBinst. Enabling this will remove your previous ISO file.
  • Add the ISO file.
  • Click GO and follow the same process.
  • Follow the same process to add more ISO files.


This method will help you create a multiboot USB flash drive which allows you to choose between multiple operating systems you desire. Remember there are many tools you can use to create such multiboot USB drives. Check out the video below to create a multiboot USB stick using Xboot Windows Tool.