When it comes to digital evidence, most investigators naturally focus on smartphones – and occasionally tablets. But the rest of the Apple ecosystem often goes unnoticed: Apple Watch, Apple TV, HomePod, even older iPod Touch models. These supplementary devices might seem irrelevant, but they can contain valuable digital artifacts: activity logs, Wi‑Fi credentials, leftover bits and pieces of information, system logs, and even synced photos.
The challenge isn’t just whether these devices hold data – it’s whether you can extract anything effectively and whether you should make the effort. In some cases, one can use checkm8 (a bootrom exploit affecting devices with A5 through A11 chips) extractions, which open the door to low-level access. In others, only logical access is possible – or no access at all, especially on newer A12+ devices. This article provides a practical view of what data you can realistically extract from supplementary Apple devices, how hard it is, and when it’s worth the effort.
Beyond iPhones and iPads, Apple’s ecosystem includes other devices that can hold digital evidence – such as iPod Touch, Apple Watch, Apple TV, and HomePod. Each device type stores different data, applies various security mechanisms, and requires distinct extraction methods and approaches – many of which are supported in iOS Forensic Toolkit.
Some still support techniques from older iPhone forensics (thanks to checkm8 compatibility). Others require pre-configured log collection or offer only a handful of timestamped artifacts. Before dedicating effort, it’s critical to know what the device can store, how difficult the extraction will be, and whether that effort will benefit the investigation.
Though formally a music player, the iPod Touch is functionally similar to an iPhone (sans SIM). The final model – the 7th generation released back in 2019 (A10 SoC, just like in iPhone 7) – was declared obsolete in 2022. It supports up to iOS 15 and can store a full suite of synced user data: messages, keychain items, Safari history, notes, and more.
All models are vulnerable to bootloader exploit, enabling low-level extraction comparable to older iPhones. These devices are rare in casework, but analyzing one – when found – is almost always worthwhile.
Data you can extract:
Access difficulty:
Apple Watch models vary in capability and protection. Series 3 and earlier can support checkm8-based access, with full access to keychain data possible. Watches also contain synced data from paired iPhones (e.g., thumbnail images, call history) and maintain their own activity logs – which can be enabled with a Sysdiagnose profile for watchOS.
However, the biggest hurdle is access. A locked watch requires its 4-digit PIN – which cannot be brute-forced – or an unlocked paired iPhone (though that alone doesn’t grant full access). If both watch and iPhone are available and unlocked, the watch rarely adds anything new. But when seized separately or if you can bypass the lock, extraction may be worthwhile.
How is data extracted, exactly? It depends on the generation of the Apple Watch.
For the earliest model – Series 0 – full physical acquisition is possible. This includes a full image of the device data partition, and even passcode unlock.
For Series 1 to Series 3, data extraction is done using a bootloader exploit, allowing access to both the file system and the keychain. The amount and type of data recovered is comparable to what’s available from Series 0; however, passcode unlock is not available.
Starting with Series 4 and newer, only logical acquisition is possible. This typically includes mediafiles (including metadata) and system logs – but no access to the file system or keychain.
Data you can extract:
Access difficulty:
An Apple TV can still be a useful source of evidence: Wi‑Fi passwords, system logs, playback history, and occasionally synced photos. It lacks passcode protection. Older models (pre-A12) are vulnerable to checkm8, enabling deeper access. Logs are the most useful artifacts, helping establish usage timelines.
Apple TVs are common, and in cases where timestamps and usage data could matter, they’re worth analyzing. The forensic value of an Apple TV depends heavily on the model. All units up to and including the first-generation Apple TV 4K are vulnerable to a bootloader exploit, allowing full file system extraction and access to additional artifacts.
Early models (1st through 3rd generation) use a microUSB port for connection, while the Apple TV HD (formerly known as the 4th generation) features USB‑C. The first-generation Apple TV 4K lacks a built-in diagnostic port and requires a special adapter for access.
Starting with the second-generation Apple TV 4K, only limited logical analysis is available. These devices don’t generate backups, and accessible data is mostly limited to metadata and usage logs. The third-generation Apple TV 4K currently offers no viable connection method: one version lacks Ethernet altogether, while the other includes it – but there is no hidden Lightning port underneath.
The original Apple TV (1st gen, 2007) is not supported and is not considered a forensically relevant device.
Data you can extract:
Access difficulty:
The original HomePod (A8 chip) is vulnerable to checkm8, offering low-level access if you build a custom adapter (often 3D-printed). Still, the data stored is minimal – even less than Apple TV.
You might retrieve logs detailing music playback, Siri invocation timestamps, Wi‑Fi profiles, or some random (usually old) call metadata. If the goal is to establish presence in a location, these sparse logs may help – but it’s generally a low-yield effort unless specifically called for.
It’s worth noting that if the speaker is used as a hub for Apple Home, it can store surprisingly useful data – including records of when someone arrived or left, lights being turned on or off, and other smart home events tied to user activity.
Data you can extract:
Access difficulty:
Apple’s extended ecosystem includes many wearable and stationary devices – some holding full sets of user data, others only timestamp markers or duplicating info found on a smartphone.
The real question is not whether the data exists, but whether it’s worth extracting.
The key takeaway: don’t ignore these devices, but don’t chase them blindly either. If a device seems low-priority, it’s okay to delay analysis – just don’t discard it. But if it could help establish an alibi, construct a timeline, or fill in behavioral gaps, spending a few hours extracting its data is often time well spent.
Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Elcomsoft iOS Forensic Toolkit official web page & downloads »