A summary of the test results are presented by requirement and include: 1) an Hardware Write Blocker (HWB) device shall not transmit a command to a protected storage device that modifies the data on the storage device. For all test cases run, the device always blocked a command that would have changed user or operating system data stored on a protected drive; 2) an HWB device shall return the data requested by a read operation. For all test cases run, the device always allowed commands to read the protected drive; 3) an HWB device shall return without modification any access-significant information requested from the drive. For all test cases run, the device always returned access-significant information from the protected drive without modification; and 4) any error condition reported by the storage device to the HWB device shall be reported to the host. For all test cases run, the device always returned error codes from the protected drive without modification. The Computer Forensics Tool Testing (CFTT) program, a joint project of the U.S. Department of Justice, National Institute of Justice (NIJ) and the National Institute of Standards and Technology's (NIST) Office of Law Enforcement Standards, and Information Technology Laboratory, provides measurable assurance to users that the tools used in computer forensics investigations provide accurate results. This document reports the results from testing the Tableau T8 Forensic Bridge (FireWire Interface) write blocker, against the Hardware Write Blocker (HWB) Assertions and Test Plan Version 1.0 and Hardware Write Blocker Device (HWB) Specification, Version 2.0.