top of page

If you plug your laptop into a PC running Windows 10, and it charges, but Windows doesn't find the phone - in iTunes or Device Manager, turn off the mobile hotspot on the iPhone. This seems to prevent Win 10 from finding the mobile device. This evening, Win 10 instantly found my iPhone right after I shut down the mobile hotspot.




 
 

You can easily clear the RAM on an iPhone by following these steps:

1. Go to Settings . . . Accessibility . . . Touch, and select the option for AssistiveTouch.

2. Then go to Settings . . . General . . . Shut Down

3. Rather than swiping 'slide to power off', press the white AssistiveTouch button, and then hold the home button for five seconds.

4. The RAM on the phone should be cleared. This will enable the phone to function faster.

Keep in mind that RAM is volatile or temporary memory. Clearing the RAM may erase some app data, as well as passwords and encryption keys. Volatile user data on an iPhone is encrypted, and cannot be easily acquired by a forensic process.

Non-volatile memory (emails, contacts, text messages and other system files) is retained even after RAM is cleared. Non-volatile memory is also called NAND flash.


 
 

Three common forensic techniques are used to extract data from mobile phones.

1. A JTAG (Joint Test Action Group) involves soldering wires to JTAG ports in order to connect to a processor which can create an image from the memory card of the phone. An example of a JTAG connection is shown here, on the website of Farley Forensics.

2. ISP (In System Programming) extractions are used when no JTAG or test access points (TAPs) are available, and the examiner has to solder a connection directly to the board.

With both JTAG and ISP connections the wires are connected to outside hardware, such as the Medusa Pro or Easy JTAG box.

3. Chip Off extractions are generally performed when JTAG or ISP extractions are not possible. This approach involves physically removing the memory card from the phone. The data on the chip can then be collected using a reader specifically designed for the chip. Devices exist which include adapters for all of the chips commonly used in smartphones.

Each of these techniques allows data on a passcode protected phone to be accessed, but not data on an encrypted phone. These methods are used when the logical, physical, and file system acquisition of data is limited or not possible.


 
 

Sean O'Shea has more than 20 years of experience in the litigation support field with major law firms in New York and San Francisco.   He is an ACEDS Certified eDiscovery Specialist and a Relativity Certified Administrator.

The views expressed in this blog are those of the owner and do not reflect the views or opinions of the owner’s employer.

If you have a question or comment about this blog, please make a submission using the form to the right. 

Your details were sent successfully!

© 2015 by Sean O'Shea . Proudly created with Wix.com

bottom of page