When an iPhone is seized and later re-examined, forensic teams sometimes find that data present in an earlier extraction are missing from a subsequent backup or filesystem image. Why exactly does that happen, what kinds of data are affected, how long do they usually live, and what can you do to preserve volatile and semi-volatile artifacts? Let’s try to find out.
It is important to understand that no data is erased while the device is powered down; information is only removed after the device is booted and unlocked. Booting iOS starts numerous background services and maintenance tasks, and many cleanup activities only run after the the device is unlocked with a passcode. Because iOS encrypts much of the filesystem, the system cannot operate on those encrypted bits until the first unlock; it is that unlock that gives the OS the ability to read, modify and garbage-collect protected data.
Once you unlock the phone to begin an extraction, background processes may begin purging old records: system logs are pruned according to their TTL policy for each event type; items in the Recently Deleted photo album will be permanently removed when their retention expires; older entries in KnowledgeC and Biome (including some location records) can be cleared; deleted iMessage messages may be purged; and Safari history entries may be removed.
These cleanup tasks do not necessarily run instantly; sometimes they finish within minutes, sometimes hours, and sometimes older records persist longer depending on system load and scheduling. In practice you may observe partial persistence for some artefacts depending on the iOS version, device state, and whether maintenance tasks run immediately after boot. Still, unlocking the device is the primary trigger that allows the system to access and modify encrypted stores.
Data is removed by OS processes, so the simplest way to prevent OS-initiated deletion is to avoid booting the device. Unfortunately, modern Apple devices (beginning with iPhone 8/8 Plus and iPhone X families) generally require a “live” extraction that loads the OS, so simply leaving the device powered off for extended periods is not a viable option.
The only reliable way to obtain repeatable extractions is to use a process that bypasses the main OS – for example, a bootloader-level extraction. Such exploit-based methods are available for older models (up to iPhone 7/7 Plus) and, with caveats, for some iPhone 8/8 Plus and iPhone X devices running older iOS versions. Generally, checkm8-class bootrom exploits affect devices through iPhone X (A5-A11); practical extraction success depends on model and iOS version and is more restricted for iPhone 8/X on newer iOS builds (see Understanding AFU and BFU in iPhone Forensics for details).
That said, some LE-exclusive tools available in select regions may utilize lower-level exploit-based extraction techniques, targeting a limited range of chips (A11..A13, covering iPhone 8/X, XR/XS and iPhone 11 generations). These low-level methods can, in theory, allow offline or semi-offline access without a full normal OS boot, but their applicability and reliability are highly dependent on the exact device model, iOS build, and other undisclosed parameters.
When exploitation is possible, a best practice is to disable normal auto-boot behavior before the OS can start. If you use iOS Forensic Toolkit, the tool will automatically clear an auto-boot flag at session start so the device cannot accidentally boot into the standard OS (it will always reboot into Recovery mode instead). From the moment auto-boot is disabled, the on-device data remain stable until that flag is restored.
It can make sense to set a non-persistent boot flag before any OS activity begins; if your lab is equipped with tools that support offline extraction (e.g. bootloader-level), do so immediately on receipt. Record the action, the tool used, and the timestamps to preserve chain of custody and support repeatability.
Here are the categories of data that are known to expire or be pruned by iOS background processes, together with typical retention windows observed in the field:
All of the above categories can generally be recovered by a standard logical extraction. In addition, low-level or agent-based extractions can surface further artifacts that have limited retention windows:
These retention windows are approximate and reflect observed behavior under typical conditions. They should be used as operational guidelines rather than absolute guarantees – iOS internals, background task scheduling, device model and iOS version can all affect exact timing.
The practical takeaway is straightforward: extract data as soon as feasible. The sooner you perform a collection, the more potential digital evidence you will preserve. Booting (more precisely: loading and unlocking) a device a month after seizure will alter the device’s state and can irreversibly remove a range of valuable artifacts. Note that sysdiagnose snapshots are most informative when created within the first 24 hours after seizure.
The recommended workflow, therefore, looks as follows:
Broadly speaking, Apple’s iCloud ecosystem follows similar retention policies to on-device data: deleted photos and iMessage conversations are supposed to remain recoverable for about 30 days. In practice, however, the situation is more complex. While iCloud Photos retain deleted items for 30 days in the ‘Recently Deleted’ album (per Apple documentation, may be longer in practice), for Messages in iCloud, deletions propagate across devices immediately, but local backups or unsynced copies may preserve older content.
To sum it up, data accessible in iCloud backups and synced containers may survive device changes, especially considering that the last iCloud backup could be made well before the device was seized. We strongly recommend performing iCloud extraction with Elcomsoft Phone Breaker in addition to device-based extractions.
Extract critical evidence from Apple iOS devices in real time. Gain access to phone secrets including passwords and encryption keys, and decrypt the file system image with or without the original passcode. Physical and logical acquisition options for all 64-bit devices running all versions of iOS.
Elcomsoft iOS Forensic Toolkit official web page & downloads »
Gain full access to information stored in FileVault 2 containers, iOS, Apple iCloud and Windows Phone devices! Download device backups from Apple iCloud and Microsoft OneDrive servers. Use Apple ID and password or extract binary authentication tokens from computers, hard drives and forensic disk images to download iCloud data without a password. Decrypt iOS backups with GPU-accelerated password recovery.