ForensicsWiki will continue to operate as it has before and will not be shutting down. Thank you for your continued support of ForensicsWiki.
Difference between pages "Chip-Off BlackBerry Curve 9320" and "Chip-Off BlackBerry Curve 9315"
Latest revision as of 22:22, 1 November 2013
The hardware used in the BlackBerry 9315's and 9320's are almost identical. The following link describes the differences between the models. http://worldwide.blackberry.com/blackberrycurve/9220-9310-9320/specifications.jsp
- Remove the back panel.
- Remove the SIM and SD Memory Card.
- Using a torx-6 screw driver remove the 2 visible screws on the back of the phone.
- Remove the screen protector using a shim, guitar pick, or prying tool.
- Remove 2 torx-5 screws.
- Use the shim to detach the outer bezel/keyboard from the device.
- Remove 4 additional torx-6 screws. The main board will now easily be separated from the back plate
- Peel off the vendor sticker.
- Remove the plastic cover protecting the track pad ribbon cable, and disconnect the track pad.
- Remove the final torx-4 screw located beneath the plastic protector, to remove the plastic keyboard overlay.
- Disconnect the ribbon cable connected to the LCD. Then using a pick separate the display from the main board.
- The tear down is now complete
- The eMMC is located beneath the heat shield directly above the Micro SD card slot.
- Place the main board in a stand or holder and position it approximately 2 1/2" - 3" inches away from a heat gun or device the blows super hot air.
- Monitoring the temperature the heat shield will come off easily between 190-200 Centigrade.
- Continue working under the high heat. With the 9315/9320's I've worked on the eMMC has been ready to lift off of the main board using tweezers immediately after removing the heat shield.
- Using liquid flux, or flux paste and a soldering iron clean the pads on the eMMC in preparation for a read
- The eMMC is now ready to read using the appropriate adapter/programmer and software.
At the time of this writing (2013OCT29) the eMMC that was removed in this example was read using an UP828 programmer via the "VBGA169E" adapter and using the "eNAND_H9DP4GG4JJACGR-4EM/459MB" device settings. The resulting image was then parsed via the CelleBrite Physical Analyzer (V. 22.214.171.124).