Under the tool requirements set for the T4 Forensic SCSI Bridge (FireWire Interface) write blocker, against the Hardware Write Blocker (HWB) Assertions and Test Plan Version 1.0 and HWB Device Specification, Version 2.0, a summary of the test results includes: 1) for all test cases run, the device always blocked any commands that would have changed user or operating system data stored on a protected drive; 2) for all test cases run, the device always allowed commands to read the protected drive; 3) for all test cases run, the device always returned access-significant information from the protected drive without modification; and 4) for all test cases run, the device always returned error codes from the protected drive without modification. The Computer Forensics Tool Testing (CFTT) program, a joint project of the National Institute of Justice (NIJ) and the National Institute of Standards and Technology's, Office of Law Enforcement and Standards and Information Technology Laboratory, seeks to provide measurable assurance to practitioners, researchers, and other users that the tools used in computer forensics investigations provide accurate results. This report presents results from testing the T4 Forensic SCSI Bridge (FireWire Interface) write blocker, against the Hardware Write Blocker (HWB) Assertions and Test Plan Version 1.0 and HWB Specification, Version 2.0.
Downloads
Similar Publications
- Training police for procedural justice: An evaluation of officer attitudes, citizen attitudes, and police-citizen interactions
- Evaluating a Multi-Disciplinary Response to Domestic Violence: The DVERT Program in Colorado Springs
- Just Science Podcast: Just Mass Disaster Emergency Response in Maui, Hawaii