Skip Repetitive Menu
U.S. Department of Justice - Office of Justice Programs NIJ Technology Home Technology Publications Technology Projects Technology Events Technology Funding Search NIJ
Office of Justice Programs logo NATIONAL INSTITUTE OF JUSTICE
COMPUTER FORENSIC TOOL TESTING
NIJ Home link
divider
Search NIJ Technology Programs
As part of its effort to help State and local agencies combat electronic crime, N I J supports the Computer Forensic Tool Testing project at the National Institute of Standards and Technology. Use the buttons below to return to the Electronic Crime home page, learn more about this project, read posted test results and the test methodology, or visit NIST's CFTT project Web site.
ECRIME Home Project Description CFTT Test Results CFTT Test Methodology NIST CFTT Site
 
News and Highlights bannerNews and Highlights bannerNews and Highlights banner
  • Test Results for Software Write Block Tools: RCMP HDL V0.4, V0.5 and V0.7

    These NIJ Special Reports present the results from testing the Royal Canadian Mounted Police Hard-Disk Write Lock V0.4, V0.5, and V0.7 against Software Write Block Tool Specification & Test Plan, Version 3.0. They documents results against 21 test assertions (both mandatory and optional), describes the testing environment, provides an interpretation of the test results, and includes test results summary log files for 40 test cases. The results provide the information necessary for developers to improve tools, users to make informed choices, and the legal community and others to understand the tools' capabilities.

    For results of RCMP HDL V0.8 and additional computer forensic tool test results, see CFTT Test Results below.

 
 
" "
 

The Computer Forensic Tool Testing Project

Objective: The objective of the Computer Forensics Tool Testing project is to provide a measure of assurance that the tools used in computer forensics investigations produce accurate results. This is accomplished by developing specifications and test methods for computer forensics tools and then testing specific tools to those specifications. The test results provide the information necessary for toolmakers to improve tools, for users to make informed choices about acquiring and using computer forensics tools, and for the legal community and others to understand the tools' capabilities. Our approach for testing computer forensic tools is based on well recognized methodologies for conformance testing and quality testing.

Who is behind the CFTT? The CFTT is a joint project of the National Institute of Justice, the National Institute of Standards and Technology, and other agencies, such as the Department of Defense and the Technical Support Working Group. The entire computer forensics community can help develop the specifications and test methods by commenting on drafts as they are published on the NIST CFTT Web site.

Status

Initial work has focused on testing hard disk imaging and write blocker tools. Specifications, test assertions and methodologies have been developed and are available.

Hard Disk Imaging: The Disk Imaging Tool Specification identifies the top level disk imaging tool requirements as:

  • The tool shall make a bit stream duplicate or an image of an original disk or partition.
  • The tool shall not alter the original disk.
  • The tool shall log I/O errors.
  • The tool's documentation shall be correct.

The test methodology is for software tools that copy or image hard disk drives. It does not cover analog media or digital media such as cell phones or PDAs.

For each product tested, there will be a test report and a report of the specific procedures used to test the product.

Hard Disk Write Block: The revised Hard Disk Write Block Tool Specification (version 2.0, May 02) identifies the top level requirements (plus test assertions):

  • The tool shall not allow a protected disk to be changed.
  • The tool shall not prevent obtaining any information from or about any disk.
  • The tool shall not prevent any changes to a disk that is not protected.

The scope of this specification is limited to software tools that protect a hard disk attached to a PC from unintended modification. No test results are available at this time.

Hard

Posted Test Results

As test results are finalized, N I J will post them here.

 

Top of Page
  NIJ logo
  NIJ logo bottom  N I J Technology Home  Site Map  Text-version  Privacy Policy  FOIA
   
Questions? Email Us
Last updated: 08/20/2004