Under the tool requirements set for the T4 Forensic SCSI Bridge (FireWire Interface) write blocker, against the Hardware Write Blocker (HWB) Assertions and Test Plan Version 1.0 and HWB Device Specification, Version 2.0, a summary of the test results includes: 1) for all test cases run, the device always blocked any commands that would have changed user or operating system data stored on a protected drive; 2) for all test cases run, the device always allowed commands to read the protected drive; 3) for all test cases run, the device always returned access-significant information from the protected drive without modification; and 4) for all test cases run, the device always returned error codes from the protected drive without modification. The Computer Forensics Tool Testing (CFTT) program, a joint project of the National Institute of Justice (NIJ) and the National Institute of Standards and Technology's, Office of Law Enforcement and Standards and Information Technology Laboratory, seeks to provide measurable assurance to practitioners, researchers, and other users that the tools used in computer forensics investigations provide accurate results. This report presents results from testing the T4 Forensic SCSI Bridge (FireWire Interface) write blocker, against the Hardware Write Blocker (HWB) Assertions and Test Plan Version 1.0 and HWB Specification, Version 2.0.
Downloads
Similar Publications
- GC–MS and IR studies on the six ring regioisomeric dimethoxybenzoyl-N-methylpiperazines (DMBzMPs)
- Toward Surface-Enhanced Raman Imaging of Latent Fingerprints
- Recovery and Detection of Ignitable Liquid Residues from the Substrates by Solid Phase Microextraction - Direct Analysis in Real Time Mass Spectrometry