A defendant hands over an iPhone. Your job is to extract the evidence. Simple, right?

Not even close.

The acquisition method you choose determines not just what you find — it determines what you miss. And in civil litigation, what you miss can cost your client the case.

iPhone forensics has three main acquisition tiers: logical, advanced logical, and full file system. Each one produces a fundamentally different evidence set. A logical extraction of an iPhone might give you 200 text messages. A full file system extraction of that same phone might give you 2,400 — including deleted content, metadata, and artifacts your opposing counsel never expected you to find.

This guide breaks down every acquisition level, the tools that run them, the device states that affect success rates, and what artifacts each method captures. If you’re doing civil work and you’re not thinking about this at the start of every examination, you’re leaving evidence on the table.

BFU vs. AFU: The Device State Problem

Before we talk about acquisition methods, we need to talk about device state. It’s the variable that overrides everything else.

BFU (Before First Unlock) is exactly what it sounds like — the device has powered on but has never been unlocked since the last boot. The vast majority of the file system is encrypted with keys that are not loaded into memory. Even with the most sophisticated tools on the market, BFU devices yield very limited data.

AFU (After First Unlock) is the state most iPhones are in when you receive them for examination. The user has unlocked the device at least once since the last boot. Encryption keys for most files are now loaded into memory (protected class “B” files are decrypted on first unlock and stay decrypted until reboot). This is the state you want.

Why does this matter for civil examiners? Because how you handle a device from the moment you receive it changes everything. If someone powers down the phone during transport — intentionally or accidentally — you may go from AFU to BFU and lose access to the bulk of extractable data.

Best practice: Place the device in a Faraday bag immediately to prevent remote wipe. Do not power it down. Do not let it lock and then run out of battery. Get it into your lab and start acquisition while the device remains in AFU state.

There’s a third state worth knowing: SFU (Secure Enclave File Under). Some researchers use this to describe the state after a user has set a longer passcode or after an iOS update has forced re-authentication. The practical takeaway is the same — authenticated, AFU state is your window for extraction.

Logical Acquisition: What You Get, What You Don't
Each evidence source provides a different perspective on digital activity, strengthening forensic conclusions when correlated.

Logical Acquisition: What You Get, What You Don’t

Logical acquisition connects to the device via USB and uses Apple’s own backup protocol to extract data. This is the same mechanism that powers iTunes and Finder backups on macOS.

What logical extraction captures:

What logical extraction does NOT capture:

Logical is fast, non-destructive, and doesn’t require passcode bypass. For many civil matters — a basic business email dispute, a custody case where you only need message history — it’s sufficient.

But understand its ceiling.

Cellebrite UFED and Magnet AXIOM both support logical acquisition. The process is largely identical across tools because it’s using Apple’s protocol. Tool choice at this level matters less than it does at higher acquisition tiers.

Advanced Logical: The Middle Ground That Matters

Advanced logical acquisition goes beyond the standard backup protocol. The most significant capability: it extracts the crash logs, shared app containers, and certain system artifacts that standard logical misses.

Some tools refer to this as “file system” access via AFC (Apple File Conduit), which exposes the media partition. This gives you:

What it still does NOT give you:

Advanced logical requires the device to be in AFU state and, in most cases, requires the device to be unlocked (or at minimum, the lockdown certificate/pairing record from a trusted computer).

This is often the practical maximum for civil examiners working without law enforcement tools or specialized exploit-based solutions.

Full File System Acquisition: The Gold Standard
Forensic analysis requires systematic documentation and cross-referencing of multiple artifact sources.

Full File System Acquisition: The Gold Standard

Full file system (FFS) extraction gives you everything — or as close to everything as current technology allows. You get the entire /private/var directory, the full application sandbox for every installed app, the keychain, system logs, location history, deleted SQLite records, and much more.

The trade-off: getting there requires bypassing Apple’s security architecture. There are two main paths.

Path 1: Checkm8 and the bootrom exploit

Checkm8 is a hardware-level bootrom exploit discovered in 2019 by a researcher known as axi0mX. Because it exploits a flaw in the hardware bootrom — not the software — Apple cannot patch it with iOS updates.

Affected devices: A5 through A11 chips. That’s iPhone 4S through iPhone X.

What this means in practice: If you’re examining an iPhone X or older, checkm8-based tools can achieve full file system extraction without knowing the device passcode — even in BFU state for some data classes, though AFU state is still preferable.

Cellebrite offers checkm8-based FFS extraction through UFED. The tool handles the exploit process and packages the output into a format compatible with their parsing software.

GrayKey (developed by Grayshift, now owned by Axon) also uses bootrom-level techniques combined with proprietary passcode cracking to achieve full file system access on a broader range of devices. GrayKey pricing is not public, but licensing runs in the tens of thousands of dollars annually. This is law enforcement-oriented tooling. Civil examiners rarely have direct access — but if you’re working alongside law enforcement or a firm that’s licensed, know what it can do.

Path 2: Passcode-Based FFS via Cellebrite Premium

For newer devices (A12 and later — iPhone XS and newer), there is no known public bootrom exploit as of 2026. Full file system acquisition requires either knowing the passcode, cracking the passcode, or using premium commercial services.

Cellebrite Premium is Cellebrite’s high-end offering that includes advanced unlocking capabilities for current-generation iPhones. This isn’t a tool you install — it’s a solution stack that involves proprietary hardware and frequently updated software. Pricing is enterprise-level and access is restricted.

For civil examiners without Premium access, the practical ceiling on modern iPhones is advanced logical unless:

  1. You know the passcode
  2. You have a pairing record from a trusted computer (which enables some advanced extraction on locked devices)
  3. You’re coordinating with law enforcement who has Premium access

What FFS Actually Gives You

Let’s get concrete. Here are the artifacts available at full file system level that you simply cannot get otherwise:

Deleted messages. SQLite databases maintain deleted records in “free pages” until those pages are overwritten. In sms.db (iMessage), WhatsApp’s ChatStorage.sqlite, and other messaging databases, deleted messages may persist as recoverable fragments. The recovery isn’t guaranteed — it depends on database activity since deletion — but the potential is real.

Location history. The consolidated location data in /private/var/root/Library/Caches/locationd/ contains detailed location information that doesn’t appear in logical backups. Significant locations, route tracking, and cell tower associations are all here.

Keychain. Passwords, encryption keys, authentication tokens. In civil litigation involving trade secret theft or unauthorized access, keychain artifacts can be decisive.

Application sandbox data. Every installed app has a sandboxed container at /private/var/mobile/Containers/Data/Application/[UUID]/. Full file system access means you can examine the complete database, cache, and document storage of every single app — not just what those apps allow to be backed up.

System logs and diagnostic data. The /private/var/log/ directory and related areas contain system events, application crashes, and usage patterns. These can establish device activity timelines even when explicit message or media evidence is absent.

KDBX/Keybag artifacts. Advanced examiners can use these to verify encryption key derivation and validate the chain of custody for encrypted content.

Tool Comparison: Cellebrite UFED vs. Magnet AXIOM vs. GrayKey

These three tools dominate the professional market. Here’s an honest comparison at each acquisition tier:

Cellebrite UFED

Magnet AXIOM

GrayKey

ExtractPhone

Artifact Coverage Matrix

Here’s a plain-language breakdown of what each acquisition level captures across common evidence categories in civil cases:

Artifact Logical Advanced Logical Full File System
iMessages (active) Yes Yes Yes
iMessages (deleted) No No Possible
Call logs Yes Yes Yes
WhatsApp messages Partial Partial Full
Signal messages No No Limited (see Signal article)
Photos + EXIF Yes Yes Yes
Deleted photos No Yes (30 days) Yes + fragments
Location history No Partial Full
Keychain Encrypted backup only No Yes
Health data Encrypted backup only No Yes
Safari history Encrypted backup only Partial Full
Email cache App dependent Partial Full
App databases (e.g., Gmail cache) App dependent Partial Full
System logs No No Yes

Chain of Custody Considerations for Each Method

Different acquisition methods carry different chain of custody implications. This matters enormously in civil litigation.

Logical extraction via the standard backup protocol is non-invasive and leaves no forensic footprint on the device. This is the safest method from a “I didn’t alter the device” standpoint.

Advanced logical using AFC or pairing records similarly doesn’t modify device data. However, the use of pairing records raises questions if the opposing party disputes how you obtained them.

Checkm8-based FFS requires booting the device into a special mode. Done correctly with a write-blocked process, it doesn’t alter user data. But the process does interact with the device at a low level, and you need to document your methodology thoroughly. The chain of custody documentation should specify:

For civil matters subject to Daubert v. Merrell Dow Pharmaceuticals, Inc., 509 U.S. 579 (1993) standards, your methodology must be documented well enough to withstand scrutiny. “I used Cellebrite” is not sufficient. “I used Cellebrite UFED version 7.X, the device was in AFU state, I acquired via checkm8 FFS, the acquisition hash was [SHA256], and I’ve retained the original extraction file” — that holds up.

What to Do When You Can’t Get Full File System

Most civil examiners working without law enforcement cooperation will hit a ceiling with modern, passcode-protected iPhones. Here’s the decision tree:

Step 1: Request the passcode as part of discovery. In civil litigation, this is often the simplest path. A court order can compel disclosure of a device passcode. This is cleaner than technical bypass from an authentication standpoint.

Step 2: Check for pairing records on associated computers. If you have access to the custodian’s computer (which you should if you’re doing comprehensive digital forensics), the iTunes/Finder pairing record may be present. This enables advanced extraction on some device/iOS combinations.

Step 3: Pursue encrypted backup. An encrypted iTunes backup captures keychain, health data, and Safari passwords that an unencrypted backup misses. If the device will pair with a computer, this is a major upgrade from standard logical. See our deep-dive on encrypted iTunes backups for civil examiners.

Step 4: Coordinate with law enforcement if criminal overlap exists. In cases with both civil and criminal dimensions, law enforcement may have GrayKey or Cellebrite Premium access. Be careful about the legal framework governing any shared evidence.

Step 5: Use cloud data to supplement. iCloud backups, Google account data, and carrier records can fill gaps that device-level extraction can’t. See iCloud vs. on-device evidence strategy for a full breakdown.

iOS Version and Hardware: The Moving Target

Apple changes the security architecture with every major iOS release. What worked for full file system extraction on iOS 15 may not work on iOS 17. This is not an exaggeration — Cellebrite has released updates that temporarily lost capability on certain iOS versions and then regained it.

As of April 2026, the broad picture looks like this:

Keep current with Cellebrite’s support matrix and the mobile forensics community (DFIR.training, ForensicFocus forums) for the latest device/iOS capability information.

Practical Workflow for Civil Examiners

Here’s the workflow I recommend for every iPhone examination in civil matters:

  1. Document device state on receipt. Battery level, locked/unlocked status, visible alerts on screen, Faraday bag placement. Photograph everything.
  1. Determine device model and iOS version. Check against your tool’s support matrix before you start. Know what’s achievable before you claim anything to counsel.
  1. Attempt advanced logical first. This is lowest-risk and often sufficient. Use UFED or AXIOM, document your process, hash the output.
  1. Evaluate FFS feasibility. Can you achieve it? Do you have the passcode? Is it a checkm8-eligible device? Will counsel pursue a court order for the passcode?
  1. Supplement with encrypted backup if device will cooperate. Create the encrypted backup, document the process, preserve the file.
  1. Report what you got and what you couldn’t get. Honest reporting of acquisition limitations is part of sound forensic practice. If you couldn’t get full file system, say so. Explain why. Explain what that means for the evidence scope.
  1. Cross-reference with cloud data. Device examination plus cloud data plus carrier records gives the fullest picture.

The goal isn’t to use the most powerful tool available. The goal is to use the right tool, document it properly, and report honestly about what the data does and doesn’t show.

Certifications and Standards for Mobile Forensic Examiners

If you’re doing this work in civil litigation and planning to testify, credentials matter. The relevant certifications in mobile forensics:

For civil litigation, having at least one of the first two (CCE or CFCE) alongside relevant vendor certifications puts you in a defensible position on expert witness qualifications.

The Bottom Line

iPhone forensics is not a pick-up-and-plug-in operation. The device state you receive it in, the hardware generation, the iOS version, and the acquisition tools you have access to all combine to determine what evidence is actually recoverable.

Logical extraction is safe and fast but has a hard ceiling. Full file system extraction is the gold standard but requires either older hardware, the device passcode, or premium commercial capabilities.

Know what you’re working with before you start. Document every step. Report honestly about what you got — and what you couldn’t get.

The cases that go sideways aren’t the ones where the examiner found nothing. They’re the ones where the examiner overclaimed what they found, or didn’t know enough to go back for more.

For questions about mobile forensic examination in civil matters, contact Derick Downs at Digital Forensics Today or visit ExtractPhone for professional mobile forensic extraction services.