{"id":2641,"date":"2017-04-12T11:55:10","date_gmt":"2017-04-12T15:55:10","guid":{"rendered":"https:\/\/www.digitalforensicscorp.com\/blog\/?p=2641"},"modified":"2024-12-11T18:37:40","modified_gmt":"2024-12-11T18:37:40","slug":"acquisition-and-forensic-analysis-of-apple-devices","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/","title":{"rendered":"Acquisition and Forensic Analysis of Apple Devices"},"content":{"rendered":"<p>Mobile devices of Apple such as iPhones and iPads are 15% of the mobile market. Therefore, they are frequently examined in <a href=\"https:\/\/www.digitalforensics.com\/\">digital forensics<\/a> laboratories.<\/p>\n<p><!--more--><\/p>\n<p>In this article we will consider two key points of forensic analysis of such devices:<\/p>\n<p>1)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Extracting data from Apple mobile devices;<\/p>\n<p>2)\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Forensic analysis of these data.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Extracting_data_from_Apple_mobile_devices\"><\/span><em>Extracting data from Apple mobile devices<\/em><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>There are four basic types of data extraction in mobile forensics:<\/p>\n<ol>\n<li>Logical extraction of the device retrieves only certain data (phonebook, call, SMS etc.). Typically, such extraction is performed by installing a special application on the mobile device. However, due to the organization of the memory of your mobile devices and safety for mobile Apple devices, this method is not applicable.<\/li>\n<li>Create a backup of the device retrieves all the logical data, the extraction of which is allowed by safety regulations. This is the most common method to extract data from mobile devices of Apple.<\/li>\n<li>The file system extraction \u2013 with this method, you can retrieve all data from the logical device. This method is applicable for Apple devices subjected to jailbreak . It allows you to extract the maximum amount of data from such devices. Unfortunately not all devices can be jailbroken. For example, the jailbreak can be done for Apple mobile devices with the latest version of the operating system \u2018iOS\u2019.<\/li>\n<li>Creating a physical dump using this method you can retrieve not only logic data, but also deleted files from the device. Unfortunately, in case of mobile Apple devices this method only works for iPhone 4 and older models.<\/li>\n<\/ol>\n<p>For making iPhone forensic images (in case of iPad the process of creating a forensic image and analysis of data will be similar), use the free utility &#8220;Belkasoft Acquisition Tool.&#8221;<\/p>\n<p><em>A free utility \u2018Belkasoft Acquisition Tool\u2019 and a trial version of the software \u2018Belkasoft Evidence Center\u2019\u00a0 are available at <a href=\"http:\/\/belkasoft.com\/get\">http:\/\/belkasoft.com\/get<\/a><\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Run the program, and click on the icon \u2018Mobile device\u2019 in the opened window.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2632 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/001.jpg\" alt=\"\" width=\"656\" height=\"547\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/001.jpg 656w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/001-300x250.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/001-512x427.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/001-16x13.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/001-32x27.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/001-28x23.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/001-56x47.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/001-64x53.jpg 64w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 1. The main window of the program \u2018Belkasoft Acquisition Tool\u2019.<\/p>\n<p>On the next window, click on the icon \u2018Apple\u2019.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2633 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/002.jpg\" alt=\"\" width=\"657\" height=\"544\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/002.jpg 657w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/002-300x248.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/002-512x424.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/002-16x13.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/002-32x26.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/002-28x23.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/002-56x46.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/002-64x53.jpg 64w\" sizes=\"auto, (max-width: 657px) 100vw, 657px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 2. The window for selecting device type (&#8216;Apple&#8217; or &#8216;Android&#8217;).<\/p>\n<p>&nbsp;<\/p>\n<p>Unlock the device from which you need to extract the data, connect it to the computer and, in response to the request on the screen of the device, click &#8216;Trust&#8217;. On the next window you must specify the path where the returned data will be stored and click \u2018Next\u2019.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2635 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/003.jpg\" alt=\"\" width=\"736\" height=\"545\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/003.jpg 736w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/003-300x222.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/003-512x379.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/003-16x12.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/003-32x24.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/003-28x21.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/003-56x41.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/003-64x47.jpg 64w\" sizes=\"auto, (max-width: 736px) 100vw, 736px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 3. The window for connecting a mobile device.<\/p>\n<p>The data extraction process starts. When the extraction is completed, a window with information about the extracted data will be displayed. You can go to the extracted data by clicking on the &#8216;Open target folder&#8217; \u00a0label in this window.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2636 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/004.jpg\" alt=\"\" width=\"735\" height=\"546\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/004.jpg 735w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/004-300x223.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/004-512x380.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/004-16x12.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/004-32x24.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/004-28x21.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/004-56x42.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/004-64x48.jpg 64w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 4. The window with information about the performed extraction.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Analysis_of_extracted_data\"><\/span><em>Analysis of extracted data<\/em><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>For the analysis of data retrieved one could use the software \u2018Belkasoft Evidence Center\u2019. Run the program. Define the parameters of the new case such as: name, path, where to place the data of the case, the name of the researcher (expert), case description, time zone. Click on the button \u2018New case\u2019.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2637 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/005.jpg\" alt=\"\" width=\"671\" height=\"372\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/005.jpg 671w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/005-300x166.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/005-512x284.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/005-16x9.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/005-32x18.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/005-28x16.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/005-56x31.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/005-64x35.jpg 64w\" sizes=\"auto, (max-width: 671px) 100vw, 671px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 5. The window for setting up a new case.<\/p>\n<p>On the next window, we specify the path to the data from the mobile device that was extracted earlier. Click the &#8216;Next&#8217; button.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2638 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/007.jpg\" alt=\"\" width=\"758\" height=\"563\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/007.jpg 758w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/007-300x223.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/007-512x380.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/007-16x12.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/007-32x24.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/007-28x21.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/007-56x42.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/007-64x48.jpg 64w\" sizes=\"auto, (max-width: 758px) 100vw, 758px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 6. The window for data source selection.<\/p>\n<p>In the next window, specify the data types (chats, email messages images, videos, calls, SMS messages, etc.) that must be removed. The more data types are specified for extraction, the longer the analysis will be performed. However, for the analysis of mobile data, the analysis time is not critical. Thus, the analysis of the device used as an example took 12 minutes.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2639 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/008.jpg\" alt=\"\" width=\"754\" height=\"566\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/008.jpg 754w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/008-300x225.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/008-512x384.jpg 512w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/008-16x12.jpg 16w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/008-32x24.jpg 32w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/008-28x21.jpg 28w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/008-56x42.jpg 56w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/008-64x48.jpg 64w\" sizes=\"auto, (max-width: 754px) 100vw, 754px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 7. The window for selecting data types \u00a0to be found<\/p>\n<p>Upon completion of the analysis process, the detected data types will be displayed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2640 size-full\" src=\"https:\/\/www.digitalforensicscorp.com\/blog\/wp-content\/uploads\/2017\/04\/009.jpg\" alt=\"\" width=\"369\" height=\"465\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/009.jpg 369w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/009-238x300.jpg 238w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/009-13x16.jpg 13w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/009-25x32.jpg 25w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/009-22x28.jpg 22w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/009-44x56.jpg 44w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/009-51x64.jpg 51w\" sizes=\"auto, (max-width: 369px) 100vw, 369px\" \/><\/p>\n<p style=\"text-align: center;\">Fig. 8. Data extracted from the analyzed device.<\/p>\n<p>&nbsp;<\/p>\n<p>Is it possible to recover deleted data from an iTunes backup. Yes. It is possible. \u2018Belkasoft Evidence Center\u2019 can recover deleted records of Phonebook, Calls, SMS messages, Web Browser History, etc.<\/p>\n<p>Thumbnails can provide info about images and video files which were deleted on the investigated device.<\/p>\n<p>The extracted and recovered data can be viewed and analyzed in the \u2018Belkasoft Evidence Center\u2019 program. Also, one can create forensic reports for them, which, including, can be presented as evidence in a court.<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><strong>Conclusion<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In this article, we looked at the types of data retrieval from mobile devices. An example of extracting and analyzing data extracted from the iPhone with the help of available programs, such as \u2018Belkasoft Acquisition Tool\u2019 and \u2018Belkasoft Evidence Center\u2019, is given.<\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Authors\"><\/span>Authors:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/linkedin.com\/in\/igormikhaylovcf\">Igor Mikhaylov<\/a> &amp; <a href=\"https:\/\/linkedin.com\/in\/oleg-skulkin\">Oleg Skulkin<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Mobile devices of Apple such as iPhones and iPads are 15% of the mobile market. Therefore, they are&hellip;","protected":false},"author":126,"featured_media":2631,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[6],"tags":[],"class_list":{"0":"post-2641","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-software","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Acquisition and Forensic Analysis of Apple Devices<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Acquisition and Forensic Analysis of Apple Devices\" \/>\n<meta property=\"og:description\" content=\"Mobile devices of Apple such as iPhones and iPads are 15% of the mobile market. Therefore, they are&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-12T15:55:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-11T18:37:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/header.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"427\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/acquisition-and-forensic-analysis-of-apple-devices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/acquisition-and-forensic-analysis-of-apple-devices\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"Acquisition and Forensic Analysis of Apple Devices\",\"datePublished\":\"2017-04-12T15:55:10+00:00\",\"dateModified\":\"2024-12-11T18:37:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/acquisition-and-forensic-analysis-of-apple-devices\\\/\"},\"wordCount\":784,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/acquisition-and-forensic-analysis-of-apple-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/header.jpg\",\"articleSection\":[\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/acquisition-and-forensic-analysis-of-apple-devices\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/acquisition-and-forensic-analysis-of-apple-devices\\\/\",\"name\":\"Acquisition and Forensic Analysis of Apple Devices\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/acquisition-and-forensic-analysis-of-apple-devices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/acquisition-and-forensic-analysis-of-apple-devices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/header.jpg\",\"datePublished\":\"2017-04-12T15:55:10+00:00\",\"dateModified\":\"2024-12-11T18:37:40+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/acquisition-and-forensic-analysis-of-apple-devices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/acquisition-and-forensic-analysis-of-apple-devices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/acquisition-and-forensic-analysis-of-apple-devices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/header.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2017\\\/04\\\/header.jpg\",\"width\":800,\"height\":427},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/acquisition-and-forensic-analysis-of-apple-devices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/software\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Acquisition and Forensic Analysis of Apple Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Acquisition and Forensic Analysis of Apple Devices","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/","og_locale":"en_US","og_type":"article","og_title":"Acquisition and Forensic Analysis of Apple Devices","og_description":"Mobile devices of Apple such as iPhones and iPads are 15% of the mobile market. Therefore, they are&hellip;","og_url":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2017-04-12T15:55:10+00:00","article_modified_time":"2024-12-11T18:37:40+00:00","og_image":[{"width":800,"height":427,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/header.jpg","type":"image\/jpeg"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"Acquisition and Forensic Analysis of Apple Devices","datePublished":"2017-04-12T15:55:10+00:00","dateModified":"2024-12-11T18:37:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/"},"wordCount":784,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/header.jpg","articleSection":["Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/","url":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/","name":"Acquisition and Forensic Analysis of Apple Devices","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/header.jpg","datePublished":"2017-04-12T15:55:10+00:00","dateModified":"2024-12-11T18:37:40+00:00","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/header.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2017\/04\/header.jpg","width":800,"height":427},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/software\/acquisition-and-forensic-analysis-of-apple-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips, Services, and Key Resources for Cybercrime Victims","item":"https:\/\/www.digitalforensics.com\/blog\/software\/"},{"@type":"ListItem","position":3,"name":"Acquisition and Forensic Analysis of Apple Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=2641"}],"version-history":[{"count":4,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2641\/revisions"}],"predecessor-version":[{"id":13726,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/2641\/revisions\/13726"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/2631"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=2641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=2641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=2641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}