has moved to this site, For information, please join the Google Group forensicswiki-reborn

Chip-Off BlackBerry Curve 9320

From Forensics Wiki
Jump to navigation Jump to search

The hardware used in the BlackBerry 9315's and 9320's are almost identical. The following link describes the differences between the models.

Tear Down

  1. Remove the back panel.
  1. Remove the SIM and SD Memory Card.
  1. Using a torx-6 screw driver remove the 2 visible screws on the back of the phone.
  1. Remove the screen protector using a shim, guitar pick, or prying tool.
  1. Remove 2 torx-5 screws.
  1. Use the shim to detach the outer bezel/keyboard from the device.
5-bb9320-TopPlate.jpg 5-1-bb9320-TopPlate.jpg
  1. Remove 4 additional torx-6 screws. The main board will now easily be separated from the back plate
  1. Peel off the vendor sticker.
  1. Remove the plastic cover protecting the track pad ribbon cable, and disconnect the track pad.
  1. Remove the final torx-4 screw located beneath the plastic protector, to remove the plastic keyboard overlay.
  1. Disconnect the ribbon cable connected to the LCD. Then using a pick separate the display from the main board.
  1. The tear down is now complete

eMMC Removal

  1. The eMMC is located beneath the heat shield directly above the Micro SD card slot.
  1. Place the main board in a stand or holder and position it approximately 2 1/2" - 3" inches away from a heat gun or device the blows super hot air.
  1. Monitoring the temperature the heat shield will come off easily between 190-200 Centigrade.
12-bb9320-HeatShield.jpg 13-bb9320-HeatShieldRemoved.jpg
  1. Continue working under the high heat. With the 9315/9320's I've worked on the eMMC has been ready to lift off of the main board using tweezers immediately after removing the heat shield.
  1. Using liquid flux, or flux paste and a soldering iron clean the pads on the eMMC in preparation for a read
15-bb9320-EMMC-Cleanup.jpg 16-bb9320-EMMC-Clean.jpg
  1. The eMMC is now ready to read using the appropriate adapter/programmer and software.

At the time of this writing (2013OCT29) the eMMC that was removed in this example was read using an UP828 programmer via the "VBGA169E" adapter and using the "eNAND_H9DP4GG4JJACGR-4EM/459MB" device settings. The resulting image was then parsed via the CelleBrite Physical Analyzer (V.