Phone Disassembly and Water-Damaged Phones

New or seasoned forensic examiners should always try several various hardware or software solutions before resorting to destructive techniques. Typically, the number one reason these are being employed is user enabled security. Other reasons may include a locked provider code placed on the file system for subsidy with the carrier. iPhones, depending on their version of OS, can have the user PIN defeated. The same applies to Android. In many cases, the supported devices do not need disassembly for the use of some of these tools. Still, techniques such as Joint Test Action Group and In-System Programming can also be included in the list of nondestructive methods. Like many tools that are used for mobile forensics, the reason the tool or utility was developed, was not originally for forensics. Many of the tools used to exploit the phone will be limited to what it supports. Examiners must understand that these tools can also alter or wipe potential evidence.