A summary of the test results are presented by requirement and include: 1) an Hardware Write Blocker (HWB) device shall not transmit a command to a protected storage device that modifies the data on the storage device. For all test cases run, the device always blocked a command that would have changed user or operating system data stored on a protected drive; 2) an HWB device shall return the data requested by a read operation. For all test cases run, the device always allowed commands to read the protected drive; 3) an HWB device shall return without modification any access-significant information requested from the drive. For all test cases run, the device always returned access-significant information from the protected drive without modification; and 4) any error condition reported by the storage device to the HWB device shall be reported to the host. For all test cases run, the device always returned error codes from the protected drive without modification. The Computer Forensics Tool Testing (CFTT) program, a joint project of the U.S. Department of Justice, National Institute of Justice (NIJ) and the National Institute of Standards and Technology's (NIST) Office of Law Enforcement Standards, and Information Technology Laboratory, provides measurable assurance to users that the tools used in computer forensics investigations provide accurate results. This document reports the results from testing the Tableau T8 Forensic Bridge (FireWire Interface) write blocker, against the Hardware Write Blocker (HWB) Assertions and Test Plan Version 1.0 and Hardware Write Blocker Device (HWB) Specification, Version 2.0.
Downloads
Similar Publications
- Prediction of Blood Back Spatter From a Gunshot in Bloodstain Pattern Analysis
- The Role of Simulated Data in Making the Best Predictions (from the 87th Annual Meeting of the American Association of Physical Anthropologists - 2018)
- Face Finder: Filtering a Large Face Database using Scars, Marks and Tattoos