SAFE Boot CD Version 1.2.1.6711 Evaluation Report
Total Page:16
File Type:pdf, Size:1020Kb
SAFE Boot CD Version 1.2.1.6711 E V A L U A T I O N R E P O R T January 2012 NIJ Electronic Crime Technology Center of Excellence 550 Marshall St., Suite B Phillipsburg, NJ 08865 www.ECTCoE.org NIJ ECTCOE TESTING AND EVALUATION PROJECT STAFF Robert J. O’Leary, CFCE; DFCP Donald Stewart, CFCE; ACE Victor Fay-Wolfe, Ph.D. Russell Yawn, CFCE Randy Becker, CFCE Kristen McCooey, CCE; ACE Chester Hosmer Jacob Fonseca Laurie Ann O’Leary Mark Davis, Ph.D. Michael Terminelli, ACE Contents n i i i Table of Contents Introduction ................................................................................................................................................................1 Overview .....................................................................................................................................................................3 Product Information .............................................................................................................................................3 Product Description .............................................................................................................................................3 Special Features ...................................................................................................................................................3 Evaluation and Testing of SAFE Boot CD ................................................................................................................5 Test Bed Confguration .........................................................................................................................................5 Test: Forensic Soundness ....................................................................................................................................6 Test Results .................................................................................................................................................10 Test: HPA/DCO Function ....................................................................................................................................10 Test Results .................................................................................................................................................11 Test: Search Functionality ..................................................................................................................................11 Test Results .................................................................................................................................................11 Test: Bitlocker Encrypted Hard Drive .................................................................................................................12 Test Results .................................................................................................................................................14 Conclusion ...............................................................................................................................................................15 SAFE Boot CD Version 1.2.1.6711 Introduction n 1 Introduction he National Institute of Justice (NIJ) Electronic process. After grants are awarded, the grantee and Crime Technology Center of Excellence the NIJ program manager then work collaboratively (ECTCoE) has been assigned the responsibility to develop the solutions. T of conducting electronic crime and digital evidence n Phase IV: Demonstrate, test, evaluate and adopt tool, technology and training testing and evaluations potential solutions into practice. A potential solu- in support of the NIJ Research, Development, Testing tion is tested to determine how well it addresses and Evaluation (RDT&E) process. the intended functional requirement. NIJ then works The National Institute of Justice RDT&E process helps with frst-adopting agencies to facilitate the intro- ensure that NIJ’s research portfolios are aligned to duction of the solution into practice. After adoption, best address the technology needs of the criminal jus- the solution’s impact on practice is evaluated. Dur- tice community. The rigorous process has fve phases: ing the testing and evaluation process, performance standards and guides are developed (as appropri- n Phase I: Determine technology needs princi- ate) to ensure safety and effectiveness; not all new pally in partnership with the Law Enforcement solutions will require the publication of new stan- and Corrections Technology Advisory Council dards or guides. (LECTAC) and the appropiate Technology Work- ing Group (TWG). NIJ identifes criminal justice n Phase V: Build capacity and conduct outreach to practitioners’ functional requirements for new tools ensure that the new tool or technology benefts and technologies. (For more information on LECTAC practitioners. NIJ publishes guides and standards and the TWGs, visit http://www,justnet.org.) and provides technology assistance to second adopters.1 n Phase II: Develop technology program plans to address those needs. NIJ creates a multiyear The High Priority Criminal Justice Technology Needs research program to address the needs identifed are organized into fve functional areas: in Phase I. One of the frst steps is to determine n Protecting the Public. whether products that meet those needs currently exist or whether they must be developed. If a solu- n Ensuring Offcer Safety. tion is already available, Phases II and III are not n necessary, and NIJ moves directly to demonstra- Confrming the Guilty and Protecting the Innocent. tion, testing and evaluation in Phase IV. If solutions n Improving the Effciency of Justice. do not currently exist, they are solicited through annual, competitively awarded science and technol- n Enabling Informed Decision-Making. ogy solicitations and TWG members help review the The NIJ ECTCoE tool, technology and training evalu- applications. ation and testing reports support the NIJ RDT&E pro- n Phase III: Develop solutions. Appropriate solici- cess, which addresses high priority needs for criminal tations are developed and grantees are selected justice technology. through an open, competitive, peer-reviewed 1 National Institute of Justice High-Priority Criminal Justice Technology Needs, March 2009 NCJ 225375. SAFE Boot CD Version 1.2.1.6711 Overview n 3 Overview Product Information “SAFE (System Acquisition Forensic Environment) is the frst and only forensically sound Windows boot SAFE Boot CD is a software write-blocking solution disk. SAFE is a fully licensed version of Windows that can be used to collect potential evidence from a PE 3.0 protected by the proven SAFE Block soft- computer. The following is from the product website ware write-blocking technology. You can now boot (www.forensicsoft.com): and safely acquire and/or analyze any X86-based computer using your favorite Windows computer “The SAFE boot disk allows for write-blocked forensic software, without the need to remove acquisition, triage and/or analysis of any attached drives. This means that you can now easily and disks, including IDE (PATA and SATA), SCSI, USB, safely image every RAID, SAS, Fiber Channel and/ IEEE1394, SAS, Fiber Channel, fash media, etc. or laptop hard drive without the need for special This includes any hardware RAID arrays, which can adapters, controller cards or any other hardware be acquired and/or analyzed in the SAFE environ- device not already present on the machine. In addi- ment as a single array rather than having to acquire tion, even those drives protected by BitLocker can individual disks and attempt to rebuild the RAID ar- be accessed and analyzed.” ray in order to analyze it. Because Windows® device drivers are readily available for all disk controllers The SAFE Boot CD is avaiable in two versions, a (i.e., SAS, SCSI, SATA, etc.), using the SAFE boot consultant version for $399 (USB) and an enterprise disk, you will never be unable to forensically image version for $1,199 (USD). a RAID array due to lack of drivers, which is a com- mon issue with forensic examiners using Linux- based boot disks. Special Features Since the SAFE boot disk is built on a Microsoft n Windows Drivers ® Windows environment, you have the ability to The most common problem with Linux-based boot utilize your favorite GUI forensic tools such as disks is that drivers for RAID and other disk control- ® ® ® EnCase , FTK Imager, X-Ways Forensics, etc. lers are often not included in and/or not available with zero learning curve. The SAFE boot disk will for common Live Linux boot CDs. Even when have you out performing onsite acquisition, triage drivers are available, most non-Linux users would and analysis immediately. The user error risks and have diffculty installing any additional driver into issues that come along with utilizing Linux-based their favorite Linux boot CD. The SAFE boot disk boot disks, such as typos in command line applica- is based on the Windows 7 x 86 operating system, tions like “dd” or confusing /dev/sda with /dev/sdb and Windows drivers are readily available for all (or similar) do not exist within the SAFE boot disk Intel-based RAID and disk controllers. SAFE comes environment.” loaded with most Windows drivers and the ability to install any additional Windows drivers with a very Product Description simple process that can be done onsite at any time if needed. From the product’s website: SAFE Boot CD Version 1.2.1.6711 4 n Overview n NTFS File System Support o Tools: DOS or Linux OS boot disks do not support writ- l FTK Imager.