Under the tool requirements set for the T4 Forensic SCSI Bridge (FireWire Interface) write blocker, against the Hardware Write Blocker (HWB) Assertions and Test Plan Version 1.0 and HWB Device Specification, Version 2.0, a summary of the test results includes: 1) for all test cases run, the device always blocked any commands that would have changed user or operating system data stored on a protected drive; 2) for all test cases run, the device always allowed commands to read the protected drive; 3) for all test cases run, the device always returned access-significant information from the protected drive without modification; and 4) for all test cases run, the device always returned error codes from the protected drive without modification. The Computer Forensics Tool Testing (CFTT) program, a joint project of the National Institute of Justice (NIJ) and the National Institute of Standards and Technology's, Office of Law Enforcement and Standards and Information Technology Laboratory, seeks to provide measurable assurance to practitioners, researchers, and other users that the tools used in computer forensics investigations provide accurate results. This report presents results from testing the T4 Forensic SCSI Bridge (FireWire Interface) write blocker, against the Hardware Write Blocker (HWB) Assertions and Test Plan Version 1.0 and HWB Specification, Version 2.0.
Downloads
Similar Publications
- Application of X-ray photoelectron spectroscopy to examine surface chemistry of cancellous bone and medullary contents to refine bone sample selection for nuclear DNA analysis
- Methods for detecting manipulations in 3D scan data
- Reflective spectroscopy investigations of clothing items to support law enforcement, search and rescue, and war crime investigations