We all know how much important data is stored in modern smartphones, making them an excellent source of evidence. However, data preservation and acquisition are not as easy as they sound. There is no silver bullet or “fire and forget” solutions to solve cases or extract evidence on your behalf. In this article, which is loosely based on our three-day training program, we will describe the proper steps in the proper order to retain and extract as much data from the iPhone as theoretically possible.
The first steps: data preservation
Probably the most important step is data preservation. You have to make sure that the iPhone will remain in the same state, and that no data is be modified (or lost) while the device is in your possession. Here is what you’ll need to do:
Why: we are trying to prevent self-discharge of the phone. If the phone is fully discharged, it may turn off. Once the iPhone is turned off, you’ll have to deal with the BFU (Before First Unlock) state, which limits your options severely compared to the AFU (After First Unlock) state. Even if the phone has a passcode set, it is much easier to break the passcode in AFU mode compared to BFU. Breaking the passcode, however, requires the lightning port to be operational, and here is what the adapter for. Finally, there is a risk the the phone will be remotely locked or wiped if it remains connected to the network.
Sounds simple? Not at all! You’ll have to handle the iPhone with utter care, or else…
Not just the iPhone
Given proper authority, make sure to collect not only the smartphone itself but also all computers (laptops and desktops) that belong to the same owner, or any computers that iPhone probably has been connected to in the past. Flash drives and external drives may sometimes help, too. Collect all companion devices such as the Apple Watch and Apple TV.
Why: computers (and external storage devices) may contain valuable information that may help to get access to locked phones, access iCloud data and more.
Collecting evidence
Of course, you need to identify the seized device. It is quite easy to look at the phone model printed on the back cover (and then use Apple web site to find out what’s that), but you can also use software such as Elcomsoft iOS Forensic Toolkit (the “I” command) to extract comprehensive information about the device. If you have lockdown records handy (extracted from the user’s computer to which the iPhone has been paired to), you’ll be able to extract the most comprehensive set of information.
How to deal with a locked iPhone
If the iPhone is locked, you’ll have to break the passcode in order to extract evidence. There are several ways to break the passcode:
The only budget solution available to everyone is logical acquisition using lockdown/pairing records that can be sometimes found on computers the device has been connected to. See Acquisition of a Locked iPhone with a Lockdown Record for this method. We published multiple updates to this topic though, including the lockdown records validity period and USB restricted mode).
Logical acquisition
Logical acquisition is the safest and easiest extraction method that does not change anything on the device (except for the last backup date) while still returning most of the data. The extraction is not limited to the backup. You can also obtain extended device information, extract media files (including music and lots of metadata), shared files, debug and diagnostics logs, and shared files. Some information about logical extraction is available in Demystifying Advanced Logical Acquisition, but there is more in our blog.
There are two issues with backup extraction though.
Physical acquisition
Some very important data never makes it to device backups. If possible, one should always attempt the full file system acquisition. This was possible for all versions of iOS 11 and some versions of iOS 12 (at this time, up to and including iOS 12.1.2). See Step by Step Guide to iOS Jailbreaking and Physical Acquisition for details, but make sure to read Forensic Implications of iOS Jailbreaking too.
However, before you go for the file extraction and jailbreak the device, make sure to perform logical acquisition first. File system acquisition is not that risky, but the jailbreak can make too many modifications to the file system of the device to be considered “forensically sound”. The rootless jailbreak is even safer than conventional jailbreaks since it does not modify the system partition; however, it offers limited device support. You can read about the differences between conventional and rootless jailbreaks in our article Forensic Implications of iOS Jailbreaking, which also raises a very important issue of how you sign the jailbreak IPA when sideloading it to the device. Signing an IPA file requires a valid Apple account. We recommend using an Apple account enrolled in Apple’s Developer Program for reasons described in the article mentioned above.
Jailbreaking, things to be aware of:
Important: you can extract both the user’s Apple ID password and the device backup password from a jailbroken device. If you followed the guide and made a local backup before jailbreaking, this is the point where you can decrypt the backup.
Currently, public jailbreaks exist for all devices and all versions of iOS 11 and all devices running iOS 12.0 through 12.1.2. RootlessJB is available for all devices except A12 devices (the iPhone Xs/Xs Max/Xr generation).
Cloud acquisition
Cloud acquisition becomes the most important acquisition method. Its advantages are:
There is actually a lot we can share about iCloud acquisition. We were the first who implemented iCloud backups downloading several years ago, and we are still the first here, extracting much more data from iCloud than any other vendor. Here is what we can get:
More data categories are on the way, including Screen Time and Home.
The major problem of cloud acquisition is that you need proper authentication credentials. You will need the user’s Apple ID and password, plus the second authentication factor (if 2FA is enabled). Alternatively, parts of iCloud data can be access with authentication tokens that can be extracted from the iPhone itself, Windows or Mac computer from which the iCloud account has been accessed.
Final thoughts
There were too many points we just couldn’t cover in a single article, or two articles, or even three. Want to know more? Attend our training course!
There’s more to iPhone analysis than acquisition. Data extraction is only the first step followed by data analysis and reporting. We have a tool for that (Elcomsoft Phone Viewer), but it only provides basic analysis and reporting. You may need a third-party tool or several tools with more advanced features.