Errr.... doesn't this violate chain of custody?
... and render anything found on the device inadmissible as you are essentially changing the source by jailbreaking it and installing your own stuff?
Or is there a safe copy technology (like Guidance's EnCase) involved to an emulator / another device that's not referenced in the article?