skip navigation

Add your conference to our Justice Events calendar


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Library collection. To conduct further searches of the collection, visit the NCJRS Abstracts Database. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.

  NCJ Number: NCJ 216299     Find in a Library
  Title: Test Results for Hardware Write Block Device: WiebeTech Forensic SATADock (USB Interface)
  Document URL: PDF 
  Corporate Author: National Institute of Standards and Technology (NIST)
United States of America
  Date Published: 12/2006
  Page Count: 18
  Annotation: This report presents the results from testing the WiebeTech Forensic SATADock write blocker against the Hardware Write Blocker (HWB) Assertions and Test Plan Version 1.0.
  Abstract: All four specifications outlined for the WiebeTech Forensic SATADock write blocker were met in the testing. Four main requirements were specified for the WiebeTech Forensic SATADock write blocker: (1) the device should not transmit a command to a protected storage device that modifies the data on the storage device; (2) the device should return the data requested by a read operation; (3) the device should return without modification any access-significant information requested from the drive; and (4) any error condition reported by the storage device to the HWB device should be reported to the host. Test results are presented according to these four specifications. Results indicated that the WiebeTech Forensic SATADock write blocker always blocked commands that would have changed user or operating system data stored on a protected drive. The device also always allowed commands to read the protected drive and always returned access-significant information from the protected drive without modification. Finally, results revealed that the device always returned error codes from the protected drive without modification. All tests were run in the National Institute of Standards and Technology’s (NIST’s) Computer Forensics Tool Testing (CFTT) laboratory using one test computer named “Freddy.” A Data Transit bus protocol analyzer was used to monitor and record commands sent from the host to the write blocker device. The hard disk drives and the support software used in the testing are described. Tables
  Main Term(s): Science and Technology
  Index Term(s): Computers ; Technical assistance reports
  Sponsoring Agency: National Institute of Justice (NIJ)
US Department of Justice
Office of Justice Programs
United States of America
  Grant Number: 2003-IJ-R-029
  Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States of America

NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America
  Type: Test/Measurement
  Country: United States of America
  Language: English
  Note: NIJ Special Report; downloaded January 31, 2007.
  To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.