This Paper Focuses on Physical Acquisition Strategies For the Joint Test Action Group (Jtag) and In-System Programming (Isp). These Methods Were Developed By Producers to Monitor Pcbs and Fix Products But Are Used As a Forensic Tool to Gather Data from a Computer. the Aim Is to Provide a Forensic Analysis of These Methods, and In Addition to some Other Studies It Will Attempt to Show That They Are Forensically Similar to some Other Process.