Under the tool requirements set for the T4 Forensic SCSI Bridge (FireWire Interface) write blocker, against the Hardware Write Blocker (HWB) Assertions and Test Plan Version 1.0 and HWB Device Specification, Version 2.0, a summary of the test results includes: 1) for all test cases run, the device always blocked any commands that would have changed user or operating system data stored on a protected drive; 2) for all test cases run, the device always allowed commands to read the protected drive; 3) for all test cases run, the device always returned access-significant information from the protected drive without modification; and 4) for all test cases run, the device always returned error codes from the protected drive without modification. The Computer Forensics Tool Testing (CFTT) program, a joint project of the National Institute of Justice (NIJ) and the National Institute of Standards and Technology's, Office of Law Enforcement and Standards and Information Technology Laboratory, seeks to provide measurable assurance to practitioners, researchers, and other users that the tools used in computer forensics investigations provide accurate results. This report presents results from testing the T4 Forensic SCSI Bridge (FireWire Interface) write blocker, against the Hardware Write Blocker (HWB) Assertions and Test Plan Version 1.0 and HWB Specification, Version 2.0.
Downloads
Similar Publications
- Enhanced DNA Profiling of the Semen Donor in Late Reported Sexual Assaults: Use of Y-Chromosome-Targeted Pre-amplification and Next Generation Y-STR Amplification Systems
- Implications of Two Backward Blood Spatter Models Based on Fluid Dynamics for Bloodstain Pattern Analysis
- Combining surface-enhanced Raman spectroscopy (SERS) and paper spray mass spectrometry (PS-MS) for illicit drug detection