Chip-Off & JTAG Forensics
Physical recovery and restoration of data from cellphones
The JTAG process was originally intended to standardize electronic-physical access to processors, chips and electronic circuit boards for system testing, troubleshooting and so forth.
Forensic JTAG / ChipOff
This special process was intended for various cases in which there was a need to recover data and retrieve existing information from a mobile device and where all other means to do so have failed. As part of the process, our laboratory experts bypass operating systems and their defensive mechanisms and physically-electronically penetrate directly into the cellular device’s physical memory. This direct penetration of the device’s memory enables harvesting its raw data – both existing and deleted – to analyze and process it using forensic tools. This transforms the raw data into comprehensible, readable information.
We possess the capabilities to perform JTAG on a large number of cellphones. For more details, contact our experts.
When should a physical restoration process be used?
It is not possible to access data or restore it any other way.
The device is out of order and cannot be repaired or restarted.
The device is password-protected and all the attempts to crack the password have failed.
What devices support JTAG & Chipp-Off recovery?
Many devices are supported. This includes many models running on Android OS. Chipp-Off is available on devices running iOS (iPhone and iPad operating system) – the Apple family of products.
Why shouldn’t the JTAG always be used to restore information?
This method requires relatively lengthy processes, compared with other methods. Therefore, it is also relatively costly. JTAG should be used only as a last resort after all other options have been exhausted.