The following binary images were created by performing either a JTAG or Chip-off data extraction technique.
The Mobile Device content column defines the typ of mobile device the contents were extracted from and links to a pdf file that documents the data contents populated onto the associated device.
The Data Extraction column defines the technique used.
The Binary Image column links to the associated binary which can be downloaded and imported into a variety of digital forensics tools capable of parsing at JTAG and/or Chip-off binary file.
|Mobile Device||Data Extraction||Binary Image|
|HTC Desire 626||Chip-off||N115018 CHIP OFF.001|
|Moto-E||Chip-off||N115015 CHIP OFF.001|
|HTC Desire S||JTAG||HTC_Desire_S_JTAG.bin|
|HTC One XL||JTAG||HTC_One_XL_JTAG.bin|
Archived Mobile Images are available
Privacy Poilcy/Security Notice -- Disclaimer | FOIA |USAGov
Last updated: February 14, 2019
Technical comments: firstname.lastname@example.org