skip navigation

Justinfo Subscribe to Stay Informed

Add your conference to our Justice Events calendar


NCJRS Abstract


Subscribe to Stay Informed
Want to be in the know? JUSTINFO is a biweekly e-newsletter containing information about new publications, events, training, funding opportunities, and Web-based resources available from the NCJRS Federal sponsors. Sign up to get JUSTINFO in your inbox.

The document referenced below is part of the NCJRS Library collection.
To conduct further searches of the collection, visit the NCJRS Abstracts Database.

How to Obtain Documents
NCJ Number: NCJ 216299     Find in a Library
Title: Test Results for Hardware Write Block Device: WiebeTech Forensic SATADock (USB Interface)
  Document URL: PDF 
Corporate Author: National Institute of Standards and Technology (NIST)
United States of America
Date Published: 12/2006
Page Count: 18
  Annotation: This report presents the results from testing the WiebeTech Forensic SATADock write blocker against the Hardware Write Blocker (HWB) Assertions and Test Plan Version 1.0.
Abstract: All four specifications outlined for the WiebeTech Forensic SATADock write blocker were met in the testing. Four main requirements were specified for the WiebeTech Forensic SATADock write blocker: (1) the device should not transmit a command to a protected storage device that modifies the data on the storage device; (2) the device should return the data requested by a read operation; (3) the device should return without modification any access-significant information requested from the drive; and (4) any error condition reported by the storage device to the HWB device should be reported to the host. Test results are presented according to these four specifications. Results indicated that the WiebeTech Forensic SATADock write blocker always blocked commands that would have changed user or operating system data stored on a protected drive. The device also always allowed commands to read the protected drive and always returned access-significant information from the protected drive without modification. Finally, results revealed that the device always returned error codes from the protected drive without modification. All tests were run in the National Institute of Standards and Technology’s (NIST’s) Computer Forensics Tool Testing (CFTT) laboratory using one test computer named “Freddy.” A Data Transit bus protocol analyzer was used to monitor and record commands sent from the host to the write blocker device. The hard disk drives and the support software used in the testing are described. Tables
Main Term(s): Science and Technology
Index Term(s): Computers ; Technical assistance reports
Sponsoring Agency: National Institute of Justice (NIJ)
US Department of Justice
Office of Justice Programs
United States of America
Grant Number: 2003-IJ-R-029
Sale Source: National Institute of Justice/NCJRS
Box 6000
Rockville, MD 20849
United States of America

NCJRS Photocopy Services
Box 6000
Rockville, MD 20849-6000
United States of America
Type: Test/Measurement
Country: United States of America
Language: English
Note: NIJ Special Report; downloaded January 31, 2007.
  To cite this abstract, use the following link:

* A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's web site is provided.