Difference between revisions of "Chip-Off Forensics"

From ForensicsWiki
Jump to: navigation, search
(Created page with "== Definition == === From Wikipedia ([http://en.wikipedia.org/wiki/Mobile_device_forensics#Forensic_desoldering http://en.wikipedia.org/wiki/Mobile_device_forensics#Forensic_d...")
(3 intermediate revisions by the same user not shown)
Line 14: Line 14:
== Procedures ==
== Procedures ==
...coming soon...
* [[Chip-Off BlackBerry Curve 9300]]
* [[Chip-Off BlackBerry Curve 9315]]
* [[Chip-Off BlackBerry Curve 9320]]
* [[Chip-Off BlackBerry Bold 9780]]

Revision as of 17:46, 30 October 2013


From Wikipedia (http://en.wikipedia.org/wiki/Mobile_device_forensics#Forensic_desoldering):

Commonly referred to as a "Chip-Off" technique within the industry - this is the last and most intrusive method to get a memory image is to desolder the non-volatile memory chip and connect it to a memory chip reader. This method contains the potential danger of total data destruction: it is possible to destroy the chip and its content because of the heat and possible physical damage from desoldering.

Forensic Application

Chip-Off forensics is an acquisition procedure which involves physically removing the NAND or flash IC from a device and reading it directly on an external NAND/Flash reader. It is considered a last-option technique, as repairing the phone to a working state post-IC removal, is quite difficult.

Tools and Equipment