skip navigation

Add your conference to our Justice Events calendar


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Library collection. To conduct further searches of the collection, visit the NCJRS Abstracts Database. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

  NCJ Number: NCJ 203196   Add to Shopping cart   Find in a Library
  Title: Tests Results for Software Write Block Tools: RCMP HDL V0.8
  Document URL: PDF 
  Corporate Author: National Institute of Standards and Technology (NIST)
United States of America
  Date Published: 02/2004
  Page Count: 102
  Annotation: This report presents the results from the testing of the Royal Canadian Mounted Police Hard Disk Write Lock V0.8 (RCMP HDL) by the Computer Forensic Tool Testing Program, to assure users that tools used in computer forensic investigations provide accurate results.
  Abstract: The Computer Forensics Tool Testing (CFTT) program is a federally supported project whose objective is to provide measurable assurance to practitioners, researchers, and other users that the tools used in forensics investigations provide accurate results. This is accomplished through developed specifications and test methods. The test results provide information that is necessary in improving tools, to make informed choices, and to understand the tools’ capabilities. This report presents the results from testing the Royal Canadian Mounted Police Hard-Disk Write Lock V0.8 (RCMP HDL) against Software Write Block Tool Specification & Test Plan, Version 3.0. Top-level tool requirements identified by this specification includes (1) the tool shall not allow a protected drive to be changed; (2) the tool shall not prevent obtaining any information from or about any drive; and (3) the tool shall not prevent any operations to a drive that is not protected. Overall results based on the above stated requirements included: (1) for all test cases run, the tool always blocked commands that would have changed any protected drives; (2) for all test cases run, the tool always allowed commands to obtain information from any protected drives; and (3) for all test cases run, the tool always allowed any command to access any unprotected drives. Information on testing was also presented in the areas of anomalies, mandatory and optional assertions, and the environment or the hardware and software. Tables
  Main Term(s): Equipment evaluation
  Index Term(s): Computer Terminals ; Standards ; Specifications ; Computer hardware systems ; Computer software ; Computers ; Equipment ; Quality control ; Forensics/Forensic Sciences ; Computer program models ; NIJ grant-related documents
  Sponsoring Agency: National Institute of Justice (NIJ)
US Department of Justice
Office of Justice Programs
United States of America
  Grant Number: 94-IJ-R-004
  Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States of America

NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America
  Type: Program/Project Evaluation
  Country: United States of America
  Language: English
  To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.