skip navigation

CrimeSolutions.gov

Add your conference to our Justice Events calendar

PUBLICATIONS

NCJRS Abstract

The document referenced below is part of the NCJRS Library collection.
To conduct further searches of the collection, visit the NCJRS Abstracts Database.

How to Obtain Documents
 
NCJ Number: NCJ 216299     Find in a Library
Title: Test Results for Hardware Write Block Device: WiebeTech Forensic SATADock (USB Interface)
Corporate Author: National Institute of Standards and Technology (NIST)
United States of America
Date Published: 12/2006
Page Count: 18
Sponsoring Agency: National Institute of Justice
US Department of Justice
Office of Justice Programs
United States of America
Grant Number: 2003-IJ-R-029
Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States of America

NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America
Document: PDF 
Type: Test/Measurement
Language: English
Country: United States of America
Annotation: This report presents the results from testing the WiebeTech Forensic SATADock write blocker against the Hardware Write Blocker (HWB) Assertions and Test Plan Version 1.0.
Abstract: All four specifications outlined for the WiebeTech Forensic SATADock write blocker were met in the testing. Four main requirements were specified for the WiebeTech Forensic SATADock write blocker: (1) the device should not transmit a command to a protected storage device that modifies the data on the storage device; (2) the device should return the data requested by a read operation; (3) the device should return without modification any access-significant information requested from the drive; and (4) any error condition reported by the storage device to the HWB device should be reported to the host. Test results are presented according to these four specifications. Results indicated that the WiebeTech Forensic SATADock write blocker always blocked commands that would have changed user or operating system data stored on a protected drive. The device also always allowed commands to read the protected drive and always returned access-significant information from the protected drive without modification. Finally, results revealed that the device always returned error codes from the protected drive without modification. All tests were run in the National Institute of Standards and Technology’s (NIST’s) Computer Forensics Tool Testing (CFTT) laboratory using one test computer named “Freddy.” A Data Transit bus protocol analyzer was used to monitor and record commands sent from the host to the write blocker device. The hard disk drives and the support software used in the testing are described. Tables
Main Term(s): Science and Technology
Index Term(s): Computers ; Technical assistance reports
Note: NIJ Special Report; downloaded January 31, 2007.
   
  To cite this abstract, use the following link:
https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=237910

* A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's web site is provided.