Go Organic XP,
Lifted from a 2009 article on lifehacker lifehacker.com/5195783/format-a-usb-drive-as-ntfs-in-windows-xp
"Windows XP does have the ability to format drives with the NTFS file system, but you wouldn't know it by looking at the format dialog—normally the option is disabled.
To enable it, open up Device Manager and find your USB drive, go to the Properties -> Policies tab and then choose "Optimize for performance". Once you've done this, you'll see the NTFS option in the format dialog.
Readers should be warned, however, that once you've enabled write caching you will need to use the Safely Remove Hardware dialog to avoid losing data—though once you format the drive as NTFS you can switch the write caching back off."
Remember to use the Then try the carbon copy cloner method
If carboncopy cloner gives you the same message, follow this link to the Microsoft resolution section on running sys to move the core boot files to the new drive
http://support.microsoft.com/kb/314057
The article has some good relevant reminders on the XP command specifics.
XP was fun, but (I bet you heard this before) Remember to keep the XP machine away from the internet, away from email, away from documents, image content, audio codec's, you only have about 50,000,000 threats your totally vulnerable to and for which no way exists to not be impacted.
If you partake in un-trustable user space content in XP and don’t isolate yourself, your safe behaviors won’t save your machine from exploit. If it connects to XP thumb drives, CD's, well, everything is exploitable
Not a judgment call on windows XP, just a fact based reflection of the territory in which you indicate the machine will have to live in.
If you get it working, you may be able to run "Microsoft EMET", system requirements are only that you be able to run the dot net 4.0 framework. If you get it to run, please report back. It should offer substantial mitigation against a plethora of threats for which no patch is available. to find it, use duckduckgo.com to search for "Microsoft EMET"
The latest EMET even does certificate pinning mitigation realtime for apps system wide. Impressive.
Not being a fan boy, noting that the DNS hijack vulnerability is 26 years old and OS/X, iOS and Android fail to implement in the OS certificate pinning of user installed apps. In iOS & Android the app developer coders should do this, but it would be nice if the OS/X got on board with a supported friendly user method.