JTAG forensics is an advanced digital data extraction technique which involves connecting to JTAG ports on the handset's printed circuit board and acquiring the raw binary data stored on the flash memory chip. JTAG extractions are typically performed on phones which have only limited forensic tool support (media files only) such as the Nokia Lumia (Windows Phone) or in situations where the handset security requires circumventing on Android devices.

Once the data has been acquired from the flash memory industry leading forensic tools and further utilities can recover PINs, Pattern Codes, Passwords etc and allow for data such as SMS text messages, call logs, contacts and multimedia to be extracted.

Prior to the JTAG method this data would have required lengthy manual examination photography for it to have been captured. The acquisition of the flash memory also allows for deleted content to be recovered.

Please contact us on 01635 866678 or info@fusionforensics.com to discuss your case requirements.