ForensicsWiki will continue to operate as it has before and will not be shutting down. Thank you for your continued support of ForensicsWiki.

Difference between revisions of "Chip-Off Forensics"

From ForensicsWiki
Jump to: navigation, search
(One intermediate revision by the same user not shown)
Line 15: Line 15:
* [[Chip-Off BlackBerry Curve 9300]]
* [[Chip-Off BlackBerry Curve 9300]]
* [[Chip-Off BlackBerry Curve 9315]]
* [[Chip-Off BlackBerry Curve 9320]]
* [[Chip-Off BlackBerry Bold 9780]]
* [[Chip-Off BlackBerry Bold 9780]]

Revision as of 17:46, 30 October 2013


From Wikipedia (

Commonly referred to as a "Chip-Off" technique within the industry - this is the last and most intrusive method to get a memory image is to desolder the non-volatile memory chip and connect it to a memory chip reader. This method contains the potential danger of total data destruction: it is possible to destroy the chip and its content because of the heat and possible physical damage from desoldering.

Forensic Application

Chip-Off forensics is an acquisition procedure which involves physically removing the NAND or flash IC from a device and reading it directly on an external NAND/Flash reader. It is considered a last-option technique, as repairing the phone to a working state post-IC removal, is quite difficult.

Tools and Equipment