Forensic disk controller
A forensic disk controller or hardware write-block device is a specialized type of computer
hard disk controllermade for the purpose of gaining read-only access to computer hard drives without the risk of damaging the drive's contents. The device is named forensic because its most common application is for use in investigations where a computer hard drive may contain evidence. Such a controller historically has been made in the form of a donglethat fits between a computer and an IDEor SCSIhard drive, but with the advent of USB and SATA, forensic disk controllers supporting these newer technologies have become widespread.
Using hardware to protect the hard drive from writes is very important for several reasons. First, many
operating systems, including Windows, may write to any hard disk that is connected to the system. At the very least, Windows will update the access timefor any file accessed, and may write things to the disk unexpectedly - such as creating hidden folders for the recycle binor saved hardware configuration. Virus infections or malwareon the system used for analysis may attempt to infect the disk being inspected. Additionally, the NTFSfile system may attempt to commit or rollback unfinished transactions, and/or change flags on the volume to mark it as "in use". At the worst, undesired files may allocate and overwrite deleted space on the hard disk which may potentially destroy evidence in the form of previously deleted files.
Protecting an evidence drive from writes during investigation is also important to counter potential allegations that the contents of the drive were altered during the investigation. Of course, this can be alleged anyway, but in the absence of technology to protect a drive from writes, there is no way for such an allegation to be refuted.
The United States
National Institute of Justiceoperates a Computer Forensics Tool Testing (CFTT) program which formally identifies [http://www.cftt.nist.gov/HWB-ATP-19.pdf] the following top-level tool requirements:
*"A hardware write block (HWB) device shall not transmit a command to a protected storage device that modifies the data on the storage device."
*"An HWB device shall return the data requested by a read operation."
*"An HWB device shall return without modification any access-significant information requested from the drive."
*"Any error condition reported by the storage device to the HWB device shall be reported to the host."
How it works
All forensic disk controllers work by capturing commands from the host
operating systemthat request the drive to overwrite sectors, and preventing them from reaching the drive. Whenever the host bus architecture supports it, the forensic disk controller reports to the host operating system that the drive is read-only.
A forensic disk controller works in one of two ways. The disk controller can either deny all writes to the disk and report them as failures, or use on-board memory to cache the writes for the duration of the session.
A disk controller that denies all writes will likely not be tolerated by an operating system that assumes that all hard disks can be written to. Although the controller could report the writes as successful, subsequent reads will return the original data, which will be unexpected by the operating system and which will cause it to malfunction due to the internal inconsistency between the operating system and the drive's actual state.
A disk controller that caches writes in memory presents the appearance to the operating system that the drive is writable, and uses the memory to ensure that the operating system sees changes to the individual disk sectors it attempted to overwrite. It does this by retrieving sectors from the disk if the operating system hasn't attempted to change them, and retrieving the changed version from memory for sectors that have been changed. This method is transparent to and compatible with all operating systems, and ensures that when the device is powered off, the disk remains unchanged and in its original state. Because the operating system's internal state persists only as long as the drive is mounted or powered on, assuming none of the writes were desired there is no adverse consequence to losing the data in the change buffer.
Wikimedia Foundation. 2010.
Look at other dictionaries:
Disk controller — The disk controller is the circuit which enables the CPU to communicate with a hard disk, floppy disk or other kind of disk drive. Early disk controllers were identified by their storage methods and data encoding. They were typically implemented… … Wikipedia
Digital forensic process — A Tableau forensic write blocker The Digital forensic process is a recognised scientific and forensic process used in digital forensics investigations. Forensics researcher Eoghan Casey … Wikipedia
Computer forensics — Forensic science Physiological sciences … Wikipedia
Digital forensics — Forensic science Physiological sciences … Wikipedia
Network forensics — Forensic science Physiological sciences … Wikipedia
Mobile device forensics — Forensic science Physiological sciences … Wikipedia
Database forensics — Forensic science Physiological sciences … Wikipedia
Anti-computer forensics — (sometimes counter forensics) is a general term for a set of techniques used as countermeasures to forensic analysis. Contents 1 Definition 1.1 Sub categories 1.2 Purpose and goals 2 … Wikipedia
Glossary of digital forensics terms — Digital forensics is a branch of the forensic sciences related to the investigation of digital devices and media. Within the field a number of normal forensics words are re purposed, and new specialist terms have evolved. Terms and definitions… … Wikipedia
List of digital forensics tools — During the 1980s, most of digital forensic investigations consisted of live analysis , examining digital media directly using non specialist tools. In the 1990s several commercial and freeware tools (both hardware and software) were created to… … Wikipedia