A guide to FRED and digital preservation sundries

An image of the Forensic Recovery of Evidence Device (FRED) computer
Georgetown’s very own Westworld-esque FRED

Last year when I was in my NDSR at Georgetown, one of the workflows I came up with a was for digital forensics. Until very recently, I shared this with only a few people outside the confines of that institution. After someone asked me for a copy, I thought others might be interested. So in the spirit of sharing, here is my Fred_guide [PDF], a long document on how to hook various devices up to a FRED, image your media (hard drives, floppy disks, zip disks, etc.), run reports, and take actions.

In addition to detailed description of my own interpretation on how to use FRED and standard tools found in the BitCurator suite, there are also instructions for some less documented tools from an archivist perspective like the SuperCard Pro, FC5025, HxCFloppy emulator software, and the BitCurator Access redaction tool. (All of which you don’t need a FRED for).

While some of it is duplicative of other efforts, I hope it will still be of some use to other archivists/librarians/curators! Feel free to take and remix, as it’s licensed under CC-BY.

Here’s a suggested attribution:

Carrano, Joe. FRED Guide. Georgetown University Library, 2017.

Note: there are a couple sections that are blank because I never got there (like access, but I think that’s something we’re all struggling with).


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s