At SYTECH we’re asked on a weekly basis to extract both live and deleted data from handsets which aren’t supported via conventional forensic methods or to bypass Mobile Phone Handsets inbuilt security (PIN, Password, Pattern etc).
One of the methods we use for such an extraction to gain access to this case essential data held within the handset is by that of a JTAG (Joint Test Action Group) dump.
This process involves the handset being connected to directly through its internal Printed Circuit Board (PCB) to allow a full physical “dump” of its internal memory chip.
This data is then carved and all recoverable user data is presented to the Investigating Officer in a clear and easy to understand manner.
Call 01782 286 300 or email firstname.lastname@example.org for FREE advice.