The forensics report suggests the device was reflashed with its normal firmware, and a different set of forensics tools were used to access the device once it was repaired.
> I brought both devices to the Newberg-Dundee Police Department Digital Forensics Lab and evaluated the iPhone 6 for function. I connected the device to power via the lightning connector and found it drew electrical current indicating it was attempting to charge the battery however the screen remained black.
I attempted to power the device on with no change on the device screen. I located an identical model
donor phone an A1549 and verified the donor device functioned properly. To eliminate the possibility
of a hardware issue on the evidence device, I swapped the circuit board from the evidence device into
the housing of the known good donor device. I attempted to boot the device however the screen
remained black. I could tell the device was booting because it drew current when powered directly from
a power supply however it was not booting normally. I was able to cycle the device between DFU mode
and recovery modes but was unable to get to boot into a normal state and there was no change on the
devices screen. Because the device would not boot normally or light the display, I believed there was
likely and issue with the device firmware. I used a repair tool to re-flash the devices firmware. After the
re-flashing repair process the device booted normally to the screen requesting the passcode. The board
swap and firmware re-flashing processes do not change the user data on the device. During the board
swap process, I only reassembled the device to a condition sufficient to make the device function.
> After receiving the copy of the search warrant, I connected the iPhone 6 to an advanced forensic
extraction tool (Graykey). I used the passcode 070106 obtained from the previous extraction of the
iPhone XS to unlock the device and obtained a Full File System extraction from the iPhone 6.