skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 236225 Find in a Library
Title: Test Results for Forensic Media Preparation Tool: dc3dd: Version 7.0.0
Corporate Author: National Institute of Standards and Technology (NIST)
United States of America
Date Published: December 2011
Page Count: 27
Sponsoring Agency: National Institute of Justice (NIJ)
Washington, DC 20531
National Institute of Justice/NCJRS
Rockville, MD 20849
National Institute of Standards and Technology (NIST)
Gaithersburg, MD 20899-3460
NCJRS Photocopy Services
Rockville, MD 20849-6000
Grant Number: 2003-IJ-R-029
Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States of America

NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America
Document: PDF
Type: Test/Measurement
Format: Document
Language: English
Country: United States of America
Annotation: This report presents the results from testing the wipe function of dc3dd version 7.0.0 against the “Forensic Media Preparation Tool Text Assertions and Test Plan Version 1.0.”
Abstract: The dc3dd tool can be used for a variety of forensic tasks (e.g., disk imaging or wiping media for reuse). The testing reported only examined the use of the tool to overwrite media for reuse. In all the test cases run against dec3dd version 7.0.0, all visible sectors were successfully overwritten. Sectors hidden by an HPA were also overwritten; however, sectors hidden by a DCO were not removed. By design, the tool does not remove either Host Protected Areas (HPAs) or DCOs; however, the Linux test environment used automatically removed the HPA on test drives, allowing sectors hidden by an HPA to be overwritten by the tool. The remaining sections of the report describe how the tests were conducted and provide documentation of test case details that support the report summary. One section of the report gives the selection of each test case from the set of possible cases defined in the test plan for forensic media preparation tools. The test cases are generally selected based on features offered by the tool. Another section lists hardware and software used to run the test cases, with links to additional information about the items used. This is followed by a section that contains a description of each test case, listing all test assertions that apply, their expected results, and the actual results. Extensive tables
Main Term(s): Science and Technology
Index Term(s): Computer aided investigations; Computer evidence; Computer hardware systems; Computer related crime; Computer software; NIJ grant-related documents
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.