Chapter 5 — Mobile Device Forensics
For most users in Nepal in 2026, the mobile phone is the most-used computing device — the place where banking happens (eSewa, Khalti, IME Pay, mobile-banking apps), where messaging happens (WhatsApp, Viber, Messenger, Telegram), where the camera lives, where the calendar lives, where location is constantly tracked. For an investigator, mobile devices are often the most-incriminating evidence source in cases ranging from financial fraud to harassment to organised crime. The forensic challenges, however, are distinct from desktop forensics: tightly-controlled hardware, sophisticated encryption, vendor-specific data structures, and a rapid evolution that quickly obsoletes tooling. This chapter covers mobile-device acquisition for iOS and Android, the categories of recoverable data, and the standard commercial and open-source tools.
5.1 Mobile device acquisition techniques
Mobile device forensics
Mobile device forensics is the sub-discipline of digital forensics concerned with the recovery of digital evidence from mobile phones, smartphones, tablets, and similar portable devices, using techniques adapted to mobile hardware, operating systems, encryption schemes, and application data structures.
The field grew from the late 1990s as mobile phones moved from voice-only devices to data-rich smartphones. By the late 2010s, mobile-device evidence was central to a majority of criminal investigations globally. The pace of change in mobile OS security has made this one of the fastest-moving sub-fields of forensics.
Categories of mobile acquisition
The forensic literature recognises several levels of acquisition, each producing different evidence quantities.
Manual acquisition. The examiner operates the device's user interface to navigate to data and records observations (photographing the screen, taking notes). Lowest level; used when nothing else is possible and the device cannot be unlocked.
Logical acquisition. The examiner extracts data through standard programmatic interfaces (backups, API calls). Captures application data, contacts, messages, photos, call logs visible to the OS. Misses deleted data, system artefacts, third-party-app internals.
File-system acquisition. Extracts the device's file system — every file, with their full contents and metadata. More data than logical acquisition; less than physical. Recovers deleted application data that is still present in SQLite databases (Section 5.2). Requires either device cooperation (jailbreak/root) or specialised exploits.
Physical acquisition. Bit-for-bit extraction of the device's storage. Captures everything, including unallocated space, deleted data, free blocks. The forensic ideal. Difficult or impossible on modern encrypted devices without the user passcode or a working exploit.
Cloud acquisition. Extraction from the cloud accounts associated with the device — iCloud, Google account. Often more accessible than the device itself; sometimes contains data the device no longer has.
Each level requires different access. The order of difficulty (and value) is typically: manual < logical < cloud < file-system < physical.
iOS acquisition
Apple's iOS has progressively strengthened its security model. As of 2026:
- Secure Enclave holds cryptographic keys; impervious to direct extraction without exploitable vulnerability.
- File-based encryption wraps file data with per-file keys.
- Passcode is required for first decryption after boot ("Before First Unlock" — BFU state). Subsequent unlocks remain available until the passcode is re-entered or the device reboots ("After First Unlock" — AFU state).
- iCloud backups (encrypted with the account password) are an alternate source of data.
Acquisition methods.
iTunes-style backup. The device produces an encrypted backup that an investigator can copy and analyse. Requires the device to be unlocked and the backup password (if set). The backup contains most user-visible data — contacts, messages (SMS and iMessage), call logs, photos, application data, settings — but not all forensic artefacts. Easiest method when feasible.
Advanced Logical Acquisition. Commercial tools (Cellebrite, Magnet AXIOM, Oxygen) request larger data extraction than standard backup, including additional categories.
Checkm8 / checkra1n. A bootrom vulnerability discovered in 2019 affects iPhones from iPhone 5s through iPhone X (A5 through A11 chips). Allows boot-time exploitation that enables file-system extraction on AFU devices and (with passcode) physical acquisition. As of 2026, newer devices (A12 onward — iPhone XS and later) are not affected.
GrayKey, Cellebrite Inseyets / Cellebrite Premium. Commercial products that exploit unpatched or known vulnerabilities to obtain access. Capabilities update frequently; specific models supported at any time are confidential commercial information.
iCloud acquisition. With the account credentials (or a court order to Apple), iCloud backups and synchronised data (Photos, Notes, iCloud Drive, Find My) can be obtained. iCloud Advanced Data Protection (introduced 2022, expanded since) end-to-end encrypts more iCloud data when the user enables it, complicating cloud acquisition.
Component-level analysis. In extreme cases (suspect cooperation refused, no software approach succeeds), some labs employ chip-off analysis — physically removing the NAND flash and reading it externally. Modern iPhones make this very difficult because data is encrypted with keys in the Secure Enclave.
Android acquisition
Android's security model has also strengthened but remains more fragmented than iOS because of the diverse manufacturer landscape (Samsung, Xiaomi, Huawei, Oppo, Vivo, Realme, OnePlus, and many others) and the wide range of Android versions in active use.
Logical acquisition via ADB.
ADB (Android Debug Bridge) is the standard Android development tool that allows a computer to communicate with an Android device over USB or network, used in forensics to extract installed apps, system information, logs, and (with sufficient permissions) application data.
Standard ADB acquisition requires USB debugging to be enabled on the device — which itself requires the device to be unlocked. Many Android devices in production have USB debugging disabled.
ADB backup. adb backup -all produces a backup file containing application data. Many apps opt out of backup (banking apps, messaging apps); the resulting backup is incomplete.
Manufacturer-specific tools. Samsung's Smart Switch, Xiaomi's Mi PC Suite — vendor backup tools that an examiner can repurpose.
Root-based acquisition. If the device is rooted (either by the user or by exploiting a vulnerability), file-system access is possible. Tools like the dd utility on the device can image partitions. Mounting /data reveals application databases, system logs, and other artefacts.
Bootloader-based acquisition. Some devices allow extraction through their bootloader (fastboot mode on Android). With unlocked bootloader, custom recovery images (TWRP) can boot the device and provide shell access.
Cellebrite UFED, Magnet AXIOM, Oxygen Forensics. Commercial tools support many Android models through various exploits and built-in capability. As with iOS, specific supported models change as exploits are added and patched.
JTAG and chip-off. Hardware-level acquisition for cases where software access is denied. JTAG uses test-access ports on the circuit board to read memory; chip-off physically removes the flash. Both require specialised equipment and skills.
Cloud acquisition. Google Account data (with credentials or court order) includes Google Drive, Photos, Maps Timeline, Calendar, Contacts, search history, and YouTube history. The Google Takeout interface (when the user is cooperative) or law-enforcement requests (when not) provide access. Synchronised Android device data (call logs, SMS depending on settings) may also be in the cloud.
Acquisition decisions
The right approach depends on:
- The device model and OS version. Specific support varies by tool.
- The lock state. BFU vs AFU; with or without passcode.
- The legal authority. What can be lawfully done.
- The required completeness. Logical may be enough; physical may be necessary.
- The time available. Some methods are immediate; others may take days.
- Tools available. Commercial tools (Cellebrite Inseyets, GrayKey) are expensive; open-source alternatives have narrower capability.
The Cyber Bureau under Nepal Police operates a mobile-forensic capability. The maturity has grown over the years but resourcing constraints — particularly the cost of commercial tools and the rapid obsolescence of capability — remain real limitations. Cases requiring cutting-edge capability sometimes need to be referred to regional partners (typically Indian forensic labs).
Preserving evidence on the device
When a phone is seized:
- Power state. If the device is on, attempt to keep it on. If off, leave it off (turning it on may trigger first-unlock state and could trigger remote-wipe).
- Isolation from networks. Faraday bag, airplane mode, or removing the SIM and ensuring Wi-Fi is off. Prevents remote wipe and incoming changes during the investigation. Some commercial Faraday-isolation cases include charging capability.
- Preserve passcodes and biometrics. Where the suspect provides cooperation (or where legally required), record passcodes. Some jurisdictions allow compelled biometric (fingerprint, face) unlocks but not compelled passcode entry — a legal distinction with technical implications.
- Document everything. Photographs of the device, SIM, packaging. Serial numbers, IMEI, model, condition.
- Chain of custody. From the moment of seizure.
The Foodmandu and Vianet breaches of 2020 included some Nepal-based mobile-forensic work as part of identifying actors; the specific techniques used were not publicly disclosed.
5.2 Recovering SMS, call logs, GPS data, application data
The acquired data — at whatever level — must be parsed and interpreted. The data structures vary by OS and by application; the standard forensic suites bundle parsers for thousands of artefacts.
SMS and iMessage
iOS. SMS and iMessage are stored in ~/Library/SMS/sms.db — a SQLite database. Key tables:
message— individual messages with text, timestamps, sender/recipient mappings.handle— counterparties (phone numbers, email addresses for iMessage).chat— conversations.chat_message_join— links messages to chats.attachment— files attached to messages.
Forensic tools parse the database and present messages in conversation form. Deleted messages may remain in the database until VACUUM operations clean up — sometimes weeks or months.
Android. SMS storage varies by manufacturer skin but is generally in an SMS provider database (e.g., mmssms.db for AOSP). Same SQLite structure principles apply.
Tools extract messages with timestamps, sender/recipient, content, and read/sent status.