Forensic disk controller: Difference between revisions

Content deleted Content added
No edit summary
Tags: Mobile edit Mobile app edit Android app edit
Citation bot (talk | contribs)
Add: date, title. Changed bare reference to CS1/2. | Use this bot. Report bugs. | Suggested by BrownHairedGirl | Linked from User:BrownHairedGirl/Articles_with_bare_links | #UCB_webform_linked 124/2197
Line 3:
[[File:Forensic tableau.JPG|thumb|220px|right|A Tableau forensic write blocker]]
[[File:Forensic disk imager.jpg|thumb|220x220px|A Tableau forensic disk imager]]
A '''forensic disk controller''' or '''hardware write-block device''' is a specialized type of computer [[hard disk controller]] made for the purpose of gaining read-only access to computer [[hard drive]]s without the risk of damaging the drive's contents. The device is named [[forensics|forensic]] because its most common application is for use in investigations where a computer hard drive may contain evidence. Such a controller historically has been made in the form of a [[dongle]] that fits between a computer and an [[Integrated Drive Electronics|IDE]] or [[SCSI]] hard drive, but with the advent of [[Universal Serial Bus|USB]] and [[Serial ATA|SATA]], forensic disk controllers supporting these newer technologies have become widespread. Steve Bress and Mark Menz invented hard drive write blocking (US Patent 6,813,682). <ref>{{Cite web|url=https://patents.google.com/patent/US6813682B2/en|title=Write protection for computer long-term memory devices}}</ref>
 
<!-- Bridge kit redirects here -->
A device which is installed between a storage media under investigation and an investigator's computer is called a "'''bridge Kit'''." The bridge kit has one connector for the storage media and another connector the investigator's computer. It allows the investigator to read, but not alter the device under investigation.<ref name="dhs">{{cite web |title=Test Results for Hardware Write Block Device: Tableau Forensic SATA/IDE Bridge T35u |date=October 2018 |publisher=[[United States Department of Homeland Security]] |url=https://www.dhs.gov/sites/default/files/publications/Test%20Report_NIST_HWB_Tableau%20Forensic%20SATA-IDE%20Bridge%20T35u_Firmware%20Version%20Sep%2015%202015%2011.19.41_October%202018.pdf |accessdate=February 23, 2021}}</ref>
 
The United States [[National Institute of Justice]] operates a Computer Forensics Tool Testing (CFTT) program which formally identifies<ref>{{Cite web|url=http://www.cftt.nist.gov/HWB-ATP-19.pdf|title=Computer Forensics Tool Testing Program (CFTT)|date=8 May 2017}}</ref> the following top-level tool requirements:
*''A hardware write block (HWB) device shall not transmit a command to a protected storage device that modifies the data on the storage device.''
*''An HWB device shall return the data requested by a read operation.''