{"id":1268,"date":"2016-08-03T09:57:07","date_gmt":"2016-08-03T09:57:07","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=1268"},"modified":"2024-12-11T19:02:18","modified_gmt":"2024-12-11T19:02:18","slug":"chip-off-technique-in-mobile-forensics","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/","title":{"rendered":"Chip-off Technique in Mobile Forensics"},"content":{"rendered":"\n<p>Nowadays digital forensic labs have a few ways of extracting data from mobile devices. <\/p>\n\n\n\n<!--more-->\n\n\n\n<p>They are the following:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>logical extraction;<\/li>\n\n\n\n<li>backup extraction;<\/li>\n\n\n\n<li>file system extraction;<\/li>\n\n\n\n<li>Joint Test Action Group (JTAG) technique;<\/li>\n\n\n\n<li>Serial Peripheral Interface (SPI, ISP) technique;<\/li>\n\n\n\n<li>Chip-off technique;<\/li>\n\n\n\n<li>combined methods.<\/li>\n<\/ul>\n\n\n\n<p>Chip-off is a technique based on chip extraction from a mobile device and reading data from it. This is the most difficult way of data extraction. But it must be used when all other methods failed. This method becomes more and more popular among <a title=\"Cell Phone Forensics\" href=\"\/digital-forensics\/cell-phone-forensics\">mobile forensic examiners<\/a>, so we decided to discuss this technique in details.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-hardware-and-software\"><span class=\"ez-toc-section\" id=\"Hardware_and_software\"><\/span>Hardware and software<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>There are a lot of tools for extraction chips from circuit boards; we\u2019ll describe only a few.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-chip-unsoldering\"><span class=\"ez-toc-section\" id=\"Chip_unsoldering\"><\/span>Chip unsoldering<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>For chip unsoldering you will need an IR station. It\u2019s difficult to name the model, because lots of them have the same features.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-data-extraction-equipment\"><span class=\"ez-toc-section\" id=\"Data_extraction_equipment\"><\/span>Data extraction equipment<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Chips in mobile devices (eMMC) have interface similar to SD cards (but eMMC has 8 bit data bus, SD card \u2013 maximum 4 bit). All eMMC can work on 1 bit bus. But if we use this feature for data extraction, it will take too much time. So we need same equipment as for SD cards and also adapters for chips.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-hardware\"><span class=\"ez-toc-section\" id=\"Hardware\"><\/span>Hardware<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>VISUAL NAND RECONSTRUCTOR [1]. This tool is very interesting, because Rusolut did a research and found the main types of BGA chips used in smartphones. Then they developed a series of adapters called SMARTPHONE KIT, which included adapters for such chips. This equipment is very useful \u2013 it reduces manual work greatly and allows an examiner to extract data from standard BGA chips very fast. We recommend to buy VISUAL NAND RECONSTRUCTOR with STANDART KIT and SMARTPHONE KIT adapters. Also Rusolut has a great knowledge base with solutions on extracting data from chips, which is available for registered users, and also articles and documentation available for free at their website [2].<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image wp-image-1269\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"2304\" height=\"1536\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off.jpg\" alt=\"1-chip-off\" class=\"wp-image-1269\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off.jpg 2304w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-300x200.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-768x512.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-1024x683.jpg 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-1536x1024.jpg 1536w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-2048x1365.jpg 2048w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-512x341.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-920x613.jpg 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-1600x1067.jpg 1600w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-1920x1280.jpg 1920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-16x11.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-32x21.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-28x19.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-56x37.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-64x43.jpg 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-1000x667.jpg 1000w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/1-chip-off-1200x800.jpg 1200w\" sizes=\"auto, (max-width: 2304px) 100vw, 2304px\" \/><figcaption class=\"wp-element-caption\">the different chips you can encounter when using the chip-off technique.<\/figcaption><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\"><strong><em>Figure 1.&nbsp;VISUAL NAND RECONTRUCTOR (Rusolut) and adapters [3]<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ACE Lab equipment. ACE Lab developed PC 3000 Flash [4], which can be used for extracting data from BGA chips. You\u2019ll get adapter kit for BGA chips with this tool.<\/li>\n<\/ul>\n\n\n\n<p>ACE Lab also has great knowledge base available for registered users. It\u2019s very useful.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Adapter kits. You can find a lot of adapter kits for BGA chips at Aliexpress [5]. They are cheap, but you can alter data while using it. Also, there is no tech support.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-software\"><span class=\"ez-toc-section\" id=\"Software\"><\/span>Software<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>One of the most powerful tools for chip-off dumps analysis is UFED Physical Analyzer [6]. This piece of software has lots of pre-made solution for parsing data. Also, an examiner can control the algorithm of data parsing choosing modules manually. What is more, you can write some code in Python for parsing data.<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image wp-image-1270\">\n<figure class=\"alignright\"><img loading=\"lazy\" decoding=\"async\" width=\"790\" height=\"644\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/2-chip-off.png\" alt=\"2-chip-off\" class=\"wp-image-1270\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/2-chip-off.png 790w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/2-chip-off-300x245.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/2-chip-off-768x626.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/2-chip-off-512x417.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/2-chip-off-16x13.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/2-chip-off-32x26.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/2-chip-off-28x23.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/2-chip-off-56x46.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/2-chip-off-64x52.png 64w\" sizes=\"auto, (max-width: 790px) 100vw, 790px\" \/><figcaption class=\"wp-element-caption\">Android DD registry for decoding the different device chips.<\/figcaption><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><strong><em>Figure 2. Customizing analysis chain of an Android smartphone dump<\/em><\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>XRY [7]. This tool has almost the same features as UFED Physical Analyzer: you can control parsing algorithm and you can write you own Python scripts.<\/li>\n\n\n\n<li>Oxygen Forensics. This tool also has similar features. But it doesn\u2019t allow you to control parsing algorithm. Why should an examiner use this piece of software? It has great tech support. We contacted them a few times having problems with parsing chip-off dumps \u2013 they created solutions for us very fast and gave it to us for free.<\/li>\n<\/ul>\n\n\n\n<p>&nbsp;<em><strong>Figure 3.&nbsp;Oxygen Forensic Extractor (Oxygen Forensic Detective)<\/strong><\/em><\/p>\n\n\n<div class=\"wp-block-image wp-image-1271\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"673\" height=\"568\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/3-chip-off.png\" alt=\"3-chip-off\" class=\"wp-image-1271\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/3-chip-off.png 673w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/3-chip-off-300x253.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/3-chip-off-512x432.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/3-chip-off-16x14.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/3-chip-off-32x27.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/3-chip-off-28x24.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/3-chip-off-56x47.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/3-chip-off-64x54.png 64w\" sizes=\"auto, (max-width: 673px) 100vw, 673px\" \/><figcaption class=\"wp-element-caption\">choose the device backup location for the data in the device&#8217;s chip.<\/figcaption><\/figure>\n<\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>Belkasoft Evidence Center [9]. The best thing about this piece of software \u2013 it supports extraction from lots of mobile apps. So, if you need to recover chats \u2013 this tool is for you. Also, Belkasoft is the first digital forensic company to support Windows Phone 8 dumps. Belkasoft supports data extraction from iOS, Android and Windows Mobile dumps.<\/li>\n\n\n\n<li>AXIOM (Magnet Forensics) [10] has features similar to Belkasoft Evidence Center.<\/li>\n\n\n\n<li>Autopsy [11] \u2013 extracts data from Android dumps. It\u2019s very powerful tool. Also, it\u2019s free.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-chip-unsoldering-tips-and-tricks\"><span class=\"ez-toc-section\" id=\"Chip_unsoldering_tips_and_tricks\"><\/span>Chip unsoldering: tips and tricks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Chip unsoldering is the most important part of chip-off process. The chip mustn\u2019t be overheated. It will delete all data. Usually it happens, because an examiner thinks that air isn\u2019t hot enough to melt soldering flux, and increases temperature too much. An examiner should remember, that chip is not only soldered to the board, but also glued with compound. That\u2019s why you should not only heat it, but also try to extract it carefully. We recommend using IR station. Even the simplest IR station with automatic temperature regulator allows unsoldering BGA chips with safety. For standard chips unsoldering temperature is ~225-230 \u00b0C, for chips glued with compound &#8211; ~240-245 \u00b0C.<\/p>\n\n\n\n<p>To extract a chip from a smartphone board we recommend heating it to 240 \u00b0C and then use a blade to extract it.<\/p>\n\n\n<div class=\"wp-block-image wp-image-1272\">\n<figure class=\"alignright\"><img loading=\"lazy\" decoding=\"async\" width=\"1280\" height=\"941\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off.jpg\" alt=\"4-chip-off\" class=\"wp-image-1272\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off.jpg 1280w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off-300x221.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off-768x565.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off-1024x753.jpg 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off-512x376.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off-920x676.jpg 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off-16x12.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off-32x24.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off-28x21.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off-56x41.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off-64x47.jpg 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off-1000x735.jpg 1000w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/4-chip-off-1200x882.jpg 1200w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><figcaption class=\"wp-element-caption\">image of chip extraction when using the chip-off technique.<\/figcaption><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\"><strong><em>Figure 4. Chip extraction from circuit board<\/em><\/strong><\/p>\n\n\n\n<p>When you unsoldered the chip from the board, you should clean it from compound. The most effective way \u2013 to melt it with hot air and remove with solder wick. Make sure your work place is well ventilated \u2013 compound evolves aggressive smoke while being heated.<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 5. Heating compound with solderer<\/em><\/p>\n\n\n<div class=\"wp-block-image wp-image-1273\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"1147\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/5-chip-off.jpg\" alt=\"5-chip-off\" class=\"wp-image-1273\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/5-chip-off.jpg 1200w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/5-chip-off-300x287.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/5-chip-off-768x734.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/5-chip-off-1024x979.jpg 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/5-chip-off-512x489.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/5-chip-off-920x879.jpg 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/5-chip-off-16x16.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/5-chip-off-32x32.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/5-chip-off-28x28.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/5-chip-off-56x54.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/5-chip-off-64x61.jpg 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/5-chip-off-1000x956.jpg 1000w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><figcaption class=\"wp-element-caption\">removal of items from cell phone chip.<\/figcaption><\/figure>\n<\/div>\n\n<div class=\"wp-block-image wp-image-1274\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"496\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/12\/6-chip-off.jpg\" alt=\"6-chip-off\" class=\"wp-image-1274\"\/><figcaption class=\"wp-element-caption\">repaired chip when using chip-off technique.<\/figcaption><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\"><strong><em>Figure 6. A chip with compound (left), cleaned chip (right)<\/em><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-practical-chip-off\"><span class=\"ez-toc-section\" id=\"Practical_Chip-off\"><\/span>Practical Chip-off<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Here we describe a few cases where chip-off technique was used for data extraction from mobile devices. Such cases are typical for our lab.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"1900\" height=\"1323\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/12\/7-chip-off.jpg\" alt=\"7-chip-off\" class=\"wp-image-1275\"\/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong><em>Figure 7. An eMMC chip with damaged controller on Rusolut adapter<\/em><\/strong><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-case-1-data-extraction-from-damaged-mobile-device\"><span class=\"ez-toc-section\" id=\"Case_1_Data_extraction_from_damaged_mobile_device\"><\/span>Case #1. Data extraction from damaged mobile device.<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Usually chip-off technique is the only way to extract data from damaged mobile devices. This was HTC M8 smartphone. We extracted BGA chip from it and read the data with PC 3000 Flash. The dump we got was parsed with UFED Physical Analyzer.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/12\/8-chip-off-scaled-1.jpg\" alt=\"8-chip-off\" class=\"wp-image-1276\"\/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong><em>Figure 8. Smartphone fragments<\/em><\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"292\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-1-chip-off-300x292.jpg\" alt=\"9-1-chip-off\" class=\"wp-image-1277\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-1-chip-off-300x292.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-1-chip-off-768x748.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-1-chip-off-512x498.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-1-chip-off-16x16.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-1-chip-off-32x32.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-1-chip-off-28x28.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-1-chip-off-56x56.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-1-chip-off-64x62.jpg 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-1-chip-off.jpg 906w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\"><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-medium\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"277\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-2-chip-off-300x277.jpg\" alt=\"9-2-chip-off\" class=\"wp-image-1278\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-2-chip-off-300x277.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-2-chip-off-768x708.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-2-chip-off-512x472.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-2-chip-off-16x16.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-2-chip-off-32x30.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-2-chip-off-28x26.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-2-chip-off-56x52.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-2-chip-off-64x59.jpg 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/9-2-chip-off.jpg 849w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\"><\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong><em>Figure 9. eMMC chip<\/em><\/strong><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"749\" height=\"569\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/10-chip-off.png\" alt=\"10-chip-off\" class=\"wp-image-1279\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/10-chip-off.png 749w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/10-chip-off-300x228.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/10-chip-off-512x389.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/10-chip-off-16x12.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/10-chip-off-32x24.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/10-chip-off-28x21.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/10-chip-off-56x43.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/10-chip-off-64x49.png 64w\" sizes=\"auto, (max-width: 749px) 100vw, 749px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 10. Data extracted from the chip<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-case-2-data-extraction-from-water-damaged-nokia-lumia-800-with-visual-nand-recontructor-rusolut\"><span class=\"ez-toc-section\" id=\"Case_2_Data_extraction_from_water_damaged_Nokia_Lumia_800_with_VISUAL_NAND_RECONTRUCTOR_Rusolut\"><\/span>Case #2. Data extraction from water damaged Nokia Lumia 800 with VISUAL NAND RECONTRUCTOR (Rusolut).<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p class=\"has-text-align-left\">In most cases chip-off technique is the last chance to extract data from water damaged mobile devices. In this case we had water damaged Nokia Lumia 800 (without visible traces, the contact with water was short).<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"762\" height=\"703\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/11-chip-off.jpg\" alt=\"11-chip-off\" class=\"wp-image-1280\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/11-chip-off.jpg 762w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/11-chip-off-300x277.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/11-chip-off-512x472.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/11-chip-off-16x16.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/11-chip-off-32x30.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/11-chip-off-28x26.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/11-chip-off-56x52.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/11-chip-off-64x59.jpg 64w\" sizes=\"auto, (max-width: 762px) 100vw, 762px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\">&nbsp;<\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 11. Phone&#8217;s circuit board<\/em><\/p>\n\n\n\n<p class=\"has-text-align-left\">We unsoldered the chip and put it into special adapter to read the data.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1037\" height=\"810\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off.jpg\" alt=\"12-chip-off\" class=\"wp-image-1281\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off.jpg 1037w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off-1024x800.jpg 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off-300x234.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off-768x600.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off-512x400.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off-920x719.jpg 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off-16x12.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off-32x25.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off-28x22.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off-56x44.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off-64x50.jpg 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off-1000x781.jpg 1000w\" sizes=\"auto, (max-width: 1037px) 100vw, 1037px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 12. Chip unsoldering<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"897\" height=\"669\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/13-chip-off.jpg\" alt=\"13-chip-off\" class=\"wp-image-1282\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/13-chip-off.jpg 897w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/13-chip-off-300x224.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/13-chip-off-768x573.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/13-chip-off-512x382.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/13-chip-off-16x12.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/13-chip-off-32x24.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/13-chip-off-28x21.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/13-chip-off-56x42.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/13-chip-off-64x48.jpg 64w\" sizes=\"auto, (max-width: 897px) 100vw, 897px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 13. BGA 169 adapter<\/em><\/p>\n\n\n\n<p class=\"has-text-align-left\">After we used simple card reader and USB write blocker to read the data.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1031\" height=\"720\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/14-chip-off.jpg\" alt=\"14-chip-off\" class=\"wp-image-1283\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/14-chip-off.jpg 1031w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/14-chip-off-300x210.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/14-chip-off-768x536.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/14-chip-off-1024x715.jpg 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/14-chip-off-512x358.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/14-chip-off-920x642.jpg 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/14-chip-off-16x11.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/14-chip-off-32x22.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/14-chip-off-28x20.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/14-chip-off-56x39.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/14-chip-off-64x45.jpg 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/14-chip-off-1000x698.jpg 1000w\" sizes=\"auto, (max-width: 1031px) 100vw, 1031px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 14. BGA 169 inserted into card reader<\/em><\/p>\n\n\n\n<p class=\"has-text-align-left\">VISUAL NAND RECONTRUCTOR successfully read the dump with rare TexFAT file system.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1054\" height=\"756\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/15-chip-off.png\" alt=\"15-chip-off\" class=\"wp-image-1284\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/15-chip-off.png 1054w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/15-chip-off-300x215.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/15-chip-off-768x551.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/15-chip-off-1024x734.png 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/15-chip-off-512x367.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/15-chip-off-920x660.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/15-chip-off-16x11.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/15-chip-off-32x23.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/15-chip-off-28x20.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/15-chip-off-56x40.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/15-chip-off-64x46.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/15-chip-off-1000x717.png 1000w\" sizes=\"auto, (max-width: 1054px) 100vw, 1054px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 15.&nbsp;VISUAL NAND RECONSTRUCTOR &#8211; Main Window<\/em><\/p>\n\n\n\n<p class=\"has-text-align-left\">Then we carved SMS messages from store.vol.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1198\" height=\"481\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/16-chip-off.jpg\" alt=\"16-chip-off\" class=\"wp-image-1285\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/16-chip-off.jpg 1198w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/16-chip-off-300x120.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/16-chip-off-768x308.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/16-chip-off-1024x411.jpg 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/16-chip-off-512x206.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/16-chip-off-920x369.jpg 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/16-chip-off-16x6.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/16-chip-off-32x13.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/16-chip-off-28x11.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/16-chip-off-56x22.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/16-chip-off-64x26.jpg 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/16-chip-off-1000x402.jpg 1000w\" sizes=\"auto, (max-width: 1198px) 100vw, 1198px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 16. Carved SMS messages<\/em><\/p>\n\n\n\n<p>That\u2019s how we extracted all data needed for investigation. The technique can be used for data extraction from almost all water damaged mobile devices.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-case-3-data-extraction-from-passcode-protected-mobile-devices-or-devices-with-damaged-display\"><span class=\"ez-toc-section\" id=\"Case_3_Data_extraction_from_passcode_protected_mobile_devices_or_devices_with_damaged_display\"><\/span>Case #3. Data extraction from passcode protected mobile devices (or devices with damaged display)<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>There are a lot of such cases in our lab. The main problem here \u2013 locked bootloaders, so you can\u2019t use the method described in our article Physical acquisition of a locked Android device [12]. Also, top mobile devices don\u2019t allow you to use JTAG technique, so chip-off is the only option.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"611\" height=\"514\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/17-chip-off.jpg\" alt=\"17-chip-off\" class=\"wp-image-1286\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/17-chip-off.jpg 611w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/17-chip-off-300x252.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/17-chip-off-512x431.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/17-chip-off-16x13.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/17-chip-off-32x27.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/17-chip-off-28x24.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/17-chip-off-56x47.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/17-chip-off-64x54.jpg 64w\" sizes=\"auto, (max-width: 611px) 100vw, 611px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 17. Passcode locked smartphone<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"477\" height=\"174\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/18-chip-off.jpg\" alt=\"18-chip-off\" class=\"wp-image-1287\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/18-chip-off.jpg 477w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/18-chip-off-300x109.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/18-chip-off-16x6.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/18-chip-off-32x12.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/18-chip-off-28x10.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/18-chip-off-56x20.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/18-chip-off-64x23.jpg 64w\" sizes=\"auto, (max-width: 477px) 100vw, 477px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 18. eMMC chip<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"916\" height=\"406\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/19-chip-off.png\" alt=\"19-chip-off\" class=\"wp-image-1288\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/19-chip-off.png 916w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/19-chip-off-300x133.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/19-chip-off-768x340.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/19-chip-off-512x227.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/19-chip-off-16x7.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/19-chip-off-32x14.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/19-chip-off-28x12.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/19-chip-off-56x25.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/19-chip-off-64x28.png 64w\" sizes=\"auto, (max-width: 916px) 100vw, 916px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 19. Data parsed with&nbsp;Oxygen Forensic\u00ae Detective<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-case-4-recovering-data-from-mobile-devices\"><span class=\"ez-toc-section\" id=\"Case_4_Recovering_data_from_mobile_devices\"><\/span>Case #4. Recovering data from mobile devices<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>That time we examined Microsoft Nokia Lumia 830 (RM-983) running Windows Mobile 8. There is no solution of data recovery from this phone other than chip-off. And again we used an adapter (USB that time) to read the data and recover deleted files.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"522\" height=\"407\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/20-chip-off.jpg\" alt=\"20-chip-off\" class=\"wp-image-1289\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/20-chip-off.jpg 522w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/20-chip-off-300x234.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/20-chip-off-512x399.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/20-chip-off-16x12.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/20-chip-off-32x25.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/20-chip-off-28x22.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/20-chip-off-56x44.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/20-chip-off-64x50.jpg 64w\" sizes=\"auto, (max-width: 522px) 100vw, 522px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 20.&nbsp;Microsoft Nokia Lumia 830 (RM-983)<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1384\" height=\"595\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off.png\" alt=\"21-chip-off\" class=\"wp-image-1290\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off.png 1384w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off-300x129.png 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off-768x330.png 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off-1024x440.png 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off-512x220.png 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off-920x396.png 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off-16x7.png 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off-32x14.png 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off-28x12.png 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off-56x24.png 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off-64x28.png 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off-1000x430.png 1000w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/21-chip-off-1200x516.png 1200w\" sizes=\"auto, (max-width: 1384px) 100vw, 1384px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 21. Smartphone disassembly<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1128\" height=\"632\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off.jpg\" alt=\"22-chip-off\" class=\"wp-image-1291\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off.jpg 1128w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off-300x168.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off-768x430.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off-1024x574.jpg 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off-512x287.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off-920x515.jpg 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off-16x9.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off-32x18.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off-28x16.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off-56x31.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off-64x36.jpg 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off-712x400.jpg 712w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/22-chip-off-1000x560.jpg 1000w\" sizes=\"auto, (max-width: 1128px) 100vw, 1128px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 22. Phone&#8217;s circuit board<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"882\" height=\"369\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/23-chip-off.jpg\" alt=\"23-chip-off\" class=\"wp-image-1292\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/23-chip-off.jpg 882w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/23-chip-off-300x126.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/23-chip-off-768x321.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/23-chip-off-512x214.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/23-chip-off-16x7.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/23-chip-off-32x13.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/23-chip-off-28x12.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/23-chip-off-56x23.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/23-chip-off-64x27.jpg 64w\" sizes=\"auto, (max-width: 882px) 100vw, 882px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 23. eMMC chip<\/em><\/p>\n\n\n\n<p class=\"has-text-align-left\">We used a USB adapter to read the data.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"488\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/24-chip-off.jpg\" alt=\"24-chip-off\" class=\"wp-image-1293\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/24-chip-off.jpg 900w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/24-chip-off-300x163.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/24-chip-off-768x416.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/24-chip-off-512x278.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/24-chip-off-16x9.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/24-chip-off-32x17.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/24-chip-off-28x15.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/24-chip-off-56x30.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/24-chip-off-64x35.jpg 64w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-left\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 24. USB adapter<\/em><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"254\" height=\"529\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/25-chip-off.jpg\" alt=\"25-chip-off\" class=\"wp-image-1294\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/25-chip-off.jpg 254w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/25-chip-off-144x300.jpg 144w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/25-chip-off-8x16.jpg 8w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/25-chip-off-15x32.jpg 15w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/25-chip-off-13x28.jpg 13w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/25-chip-off-27x56.jpg 27w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/25-chip-off-31x64.jpg 31w\" sizes=\"auto, (max-width: 254px) 100vw, 254px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"has-text-align-center\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 25. Partition structure<\/em><\/p>\n\n\n\n<p>Also we use chip-off technique for data recovery from top Android devices. For example, recently we recovered data from HTC One smartphone running Android 6.0. It has locked bootloader, so there is no way to create physical image via ADB. Also we don\u2019t have equipment to extract data from it via JTAG.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-case-5-data-extraction-from-old-mobile-devices\"><span class=\"ez-toc-section\" id=\"Case_5_Data_extraction_from_old_mobile_devices\"><\/span>Case #5. Data extraction from old mobile devices<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Sometimes we need to extract data from very old mobile devices. Usually we can\u2019t even connect such devices to workstation, because they don\u2019t have interfaces. Also, usually there is no way to perform logical extraction either. So the only way to extract data (especially deleted) is using chip-off technique.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1567\" height=\"770\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off.jpg\" alt=\"26-chip-off\" class=\"wp-image-1295\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off.jpg 1567w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off-300x147.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off-768x377.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off-1024x503.jpg 1024w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off-1536x755.jpg 1536w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off-512x252.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off-920x452.jpg 920w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off-16x8.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off-32x16.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off-28x14.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off-56x28.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off-64x31.jpg 64w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off-1000x491.jpg 1000w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/26-chip-off-1200x590.jpg 1200w\" sizes=\"auto, (max-width: 1567px) 100vw, 1567px\" \/><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\"><em>Figure 26. JPG header in&nbsp;Sony Ericsson SE-T303 dump<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-discussion\"><span class=\"ez-toc-section\" id=\"Discussion\"><\/span>Discussion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Chip-off is the most difficult way of data extraction from mobile devices. This method forces examiner to work with encryption and encoding, unknown or hardly known file systems, new formats of databases. But, nevertheless, nowadays this technique is the most promising, because it can help to extract all the data both from working and damaged mobile devices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-references\"><span class=\"ez-toc-section\" id=\"References\"><\/span>References<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>VISUAL NAND RECONSTRUCTOR <a href=\"http:\/\/rusolut.com\/\">http:\/\/rusolut.com<\/a><\/li>\n\n\n\n<li>VNR Documentation<\/li>\n\n\n\n<li>RUSOLUT NAND Adapters<\/li>\n\n\n\n<li>PC 3000 Flash <a href=\"http:\/\/www.acelaboratory.com\/pc3000flash.php\">http:\/\/www.acelaboratory.com\/pc3000flash.php<\/a><\/li>\n\n\n\n<li>eMMC\/eMCP 3in1 socket USB,9&#215;11 11&#215;10 11.5&#215;13 12&#215;16 12&#215;18 14&#215;18,eMMC programmer adapter reader, BGA169\/153\/162\/186\/221, 3in1&nbsp;<a href=\"http:\/\/aliexpress.com\/item\/eMMC-eMCP-3in1-socket-SD-9x11-11x10-11-5x13-12x16-12x18-14x18-eMMC-programmer-adapter-reader\/32542535705.html\">http:\/\/aliexpress.com\/item\/eMMC-eMCP-3in1-socket-SD-9&#215;11-11&#215;10-11-5&#215;13-12&#215;16-12&#215;18-14&#215;18-eMMC-programmer-adapter-reader\/32542535705.html<\/a><\/li>\n\n\n\n<li>\n<ol start=\"6\" class=\"wp-block-list\">\n<li>UFED Physical Analyzer <a href=\"http:\/\/www.cellebrite.com\/Mobile-Forensics\/Applications\/ufed-physical-analyzer\">http:\/\/www.cellebrite.com\/Mobile-Forensics\/Applications\/ufed-physical-analyzer<\/a><\/li>\n\n\n\n<li>Micro Systemation <a href=\"https:\/\/www.msab.com\/\">https:\/\/www.msab.com\/<\/a><\/li>\n\n\n\n<li>Oxygen Forensics <a href=\"http:\/\/www.oxygen-forensic.com\/en\/\">http:\/\/www.oxygen-forensic.com\/en\/<\/a><\/li>\n\n\n\n<li>Belkasoft Evidence Center <a href=\"http:\/\/belkasoft.com\/\">http:\/\/belkasoft.com<\/a><\/li>\n\n\n\n<li>AXIOM <a href=\"https:\/\/www.magnetforensics.com\/magnet-axiom\/\">https:\/\/www.magnetforensics.com\/magnet-axiom\/<\/a><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n\n\n\n<p>&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-about-the-authors\"><span class=\"ez-toc-section\" id=\"About_the_authors\"><\/span>About the authors:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p><a href=\"http:\/\/linkedin.com\/in\/igormikhaylovcf\" target=\"_blank\" rel=\"noopener\">Igor Mikhaylov<\/a><\/p>\n\n\n\n<p>Interests: Computer, Cell Phone &amp; Chip-Off Forensics<\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/in\/oleg-skulkin-96652a87\" target=\"_blank\" rel=\"noopener\">Oleg Skulkin<\/a><\/p>\n\n\n\n<p>Interests: iOS forensics, Android forensics, Mac OS X forensics, Windows forensics, Linux forensics<\/p>\n","protected":false},"excerpt":{"rendered":"Nowadays digital forensic labs have a few ways of extracting data from mobile devices.","protected":false},"author":126,"featured_media":1281,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-1268","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Chip-Off Technique: Visual Guide to Mobile Forensics<\/title>\n<meta name=\"description\" content=\"A visual guide on how the Chip-Off Technique is used in mobile forensics. Lean how this technique is used the benefits in recovering data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Chip-off Technique in Mobile Forensics\" \/>\n<meta property=\"og:description\" content=\"A visual guide on how the Chip-Off Technique is used in mobile forensics. Lean how this technique is used the benefits in recovering data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-03T09:57:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T19:02:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1037\" \/>\n\t<meta property=\"og:image:height\" content=\"810\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"13 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/chip-off-technique-in-mobile-forensics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/chip-off-technique-in-mobile-forensics\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Chip-off Technique in Mobile Forensics\",\"datePublished\":\"2016-08-03T09:57:07+00:00\",\"dateModified\":\"2024-12-11T19:02:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/chip-off-technique-in-mobile-forensics\\\/\"},\"wordCount\":1599,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/chip-off-technique-in-mobile-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/08\\\/12-chip-off.jpg\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/chip-off-technique-in-mobile-forensics\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/chip-off-technique-in-mobile-forensics\\\/\",\"name\":\"Chip-Off Technique: Visual Guide to Mobile Forensics\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/chip-off-technique-in-mobile-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/chip-off-technique-in-mobile-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/08\\\/12-chip-off.jpg\",\"datePublished\":\"2016-08-03T09:57:07+00:00\",\"dateModified\":\"2024-12-11T19:02:18+00:00\",\"description\":\"A visual guide on how the Chip-Off Technique is used in mobile forensics. Lean how this technique is used the benefits in recovering data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/chip-off-technique-in-mobile-forensics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/chip-off-technique-in-mobile-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/chip-off-technique-in-mobile-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/08\\\/12-chip-off.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2016\\\/08\\\/12-chip-off.jpg\",\"width\":1037,\"height\":810,\"caption\":\"12-chip-off Chip-off Technique in Mobile Forensics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/chip-off-technique-in-mobile-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Chip-off Technique in Mobile Forensics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Chip-Off Technique: Visual Guide to Mobile Forensics","description":"A visual guide on how the Chip-Off Technique is used in mobile forensics. Lean how this technique is used the benefits in recovering data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/","og_locale":"en_US","og_type":"article","og_title":"Chip-off Technique in Mobile Forensics","og_description":"A visual guide on how the Chip-Off Technique is used in mobile forensics. Lean how this technique is used the benefits in recovering data.","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2016-08-03T09:57:07+00:00","article_modified_time":"2024-12-11T19:02:18+00:00","og_image":[{"width":1037,"height":810,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off.jpg","type":"image\/jpeg"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"13 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Chip-off Technique in Mobile Forensics","datePublished":"2016-08-03T09:57:07+00:00","dateModified":"2024-12-11T19:02:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/"},"wordCount":1599,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off.jpg","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/","name":"Chip-Off Technique: Visual Guide to Mobile Forensics","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off.jpg","datePublished":"2016-08-03T09:57:07+00:00","dateModified":"2024-12-11T19:02:18+00:00","description":"A visual guide on how the Chip-Off Technique is used in mobile forensics. Lean how this technique is used the benefits in recovering data.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2016\/08\/12-chip-off.jpg","width":1037,"height":810,"caption":"12-chip-off Chip-off Technique in Mobile Forensics"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/chip-off-technique-in-mobile-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Chip-off Technique in Mobile Forensics"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1268","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=1268"}],"version-history":[{"count":8,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1268\/revisions"}],"predecessor-version":[{"id":12979,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/1268\/revisions\/12979"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/1281"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=1268"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=1268"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=1268"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}