Featured Resources

Revealing hidden data: Full file system extractions uncovered

The two types of extractions for mobile device investigations are full file system extractions and logical. It’s important to know the difference, since iOS and Android devices in digital forensics have become increasingly important in both law enforcement and corporate investigations.  

Mobile device evidence can be critical to the investigations of fraud, intellectual property theft, policy violations, litigation support, insurance investigations, and eDiscovery.

Knowing the critical nature of mobile device information in these cases, it is important to understand the types of extractions available. Full file system and logical extractions have significant differences in what data is extracted from the device.

Logical extractions focus on user data and files that can be accessed through standard interfaces. These include contacts, traditional SMS messaging and limited application data. Full file system extractions are a much more complete extraction of data. They includes file system data that users would not normally be able to access directly: the user-generated data from the logical extraction, system files and much more application data.   

In this examination, we extracted data from a test device utilizing Magnet Process Quick Image, which is a logical extraction. We also extracted a full file system extraction using Magnet Verakey. The extractions were then processed into Axiom Cyber 8.0.0.39753.  

Let’s look at the overall difference in the amount of extracted data:                                                                                

Quick (logical) extraction

A screenshot showing the total number of artifacts (7,310) in a the logical extraction of our test device.

Full file system extraction

A screenshot showing the total number of artifacts (119,529) in a the full file system extraction of our test device.

Overall, we can see there is a considerable difference between these two extractions, now let’s focus on a couple of major differences: 

Email and Calendar

Logical extraction

A screenshot showing the total number of email and calendar artifacts extracted by the logical extraction of our test device.

Full file system extraction

A screenshot showing the total number of email and calendar artifacts (208) extracted by the full file system extraction of our test device.

In this category of artifact, there is a clear delineation between the two extractions. Both were able to extract the Calendar, but only the full file system retrieved any Gmail emails.

For example, in an intellectual property theft investigation, the communications between the employee and outside individual attempting to procure the IP would not have been discovered if the email had not been collected. In a recent case that utilized a full file system extraction and Magnet Axiom to parse the evidence, the employee had been utilizing a separate email from the corporate-provided one. The emails captured from this device provided a timeline of contacts, identified a conspirator, and identified a negotiated price for the stolen IP. Going back to the test data, we can see that an email from Facebook could provide the critical context (and time) that would only be apparent through the extraction of a full file system:

A screenshot of a GroupMe email from Facebook with critical time and date information included.

Location

Logical Extraction

A screenshot showing the total number of location artifacts (10) extracted by the logical extraction of our test device.

Full File System Extraction

A screenshot showing the total number of location artifacts (12,181) extracted by the full file system extraction of our test device.

Again, we see considerably more categories of artifacts extracted utilizing the full file system extraction.   

Location data can be some of the best artifacts to identify and can be applicable across a broad spectrum of investigations. For internal investigations in particular, location data can provide the ability to contradict or affirm an employee’s statement as to their location.  For example, this location data point could be critical and/or responsive to the request for information that would not be found in the logical extraction:  

A screenshot of the Details view for an artifact in Magnet Axiom Cyber

Communications

Communications are frequently the most sought-after data that can be extracted from mobile devices. Again, the full file system extraction contained considerably more data: 

Logical extraction

A screenshot showing the total number of communication artifacts (87) extracted by the logical extraction of our test device.

Full file system extraction

A screenshot showing the total number of communication artifacts (175) extracted by the full file system extraction of our test device.

Communications is another artifact category that can be useful in a variety of investigations. The extent of captured communications in a full file system extraction is significantly greater than the traditional logical extraction. In particular, third-party communication applications (Snapchat, Signal, Facebook Messenger, etc.) are likely only to be captured in the full file system extraction. Communications can set up interactions between co-conspirators, identify a timeline of activities, and even provide images (see example below). In a recent case utilizing a full file system extraction and Magnet Axiom, it was discovered that an employee had responded to a smishing attempt over a third-party communication application. After entering their credentials, it allowed for the employee’s credentials to be compromised. This interaction was only captured as part of the full file system extraction.   

Going back to the test data, we can see a Snapchat message located only in the full file system extraction containing a potentially relevant exchange: 

A screenshot of a snapchat image of a Sherwin Williams store. Below the photo there is a user named "WALLOBITZ95" who has typed at 2/1/2023 5:57:30.073PM "We should go there"

Web activity

Another extracted artifact that is of critical interest is the web browser-related activity on the device: 

Logical extraction

A screenshot showing the total number of web related artifacts (1,449) extracted by the logical extraction of our test device.

Full file system extraction

A screenshot showing the total number of web related artifacts (14,206) extracted by the full file system extraction of our test device.

The difference in this case is the depth of the data extracted from the device. The logical does have some web browser activity, the full file system just has significantly more data.  

In this example, the device was navigated to the website https://helka.finna.fi/, which was not found in the logical file extraction. The act of navigating to this website could be critical to the data collection and full picture of the investigation. Web history can also be used across many investigations from employee misconduct, incident response, and litigation support. Getting a full picture of activities on a device can only be achieved through a full file system extraction.   

The categories “Safari iCloud Devices” and “Safari iCloud Tabs” are two additional groups of artifacts that could provide additional information in this case. Safari iCloud Tabs contains information about tabs that have been opened in the browser and synced to an iCloud account. Synchronized tabs are available to any device that logs in to the iCloud account. Safari iCloud Devices contains information about the devices that are synced to an iCloud account. Each device can access any browser tabs that are synced to the account. A closer examination of these categories could identify evidence that may need to be collected for the investigation, which could include physical devices and/or iCloud accounts. 

System information

In this final category, we examine information only tracked by the iOS system and would not be visible to the user. Let’s first examine this data grouped under Operating System and Application usage: 

Logical extraction:

A screenshot showing the total number of operating system artifacts (206) extracted by the logical extraction of our test device.
A screenshot showing the total number of application usage artifacts (333) extracted by the logical extraction of our test device.

For the full file system extraction:

A screenshot showing the total number of operating system artifacts (4,618) extracted by the full file system extraction of our test device.
A screenshot showing the total number of application usage artifacts (4,618) extracted by the full file system extraction of our test device.

But why would the system information and Application usage be of interest? Here are some artifacts that would only be seen in the full file system extraction: 

A screenshot of artifact information for a Biome Application Launch artifact.

From the Biome Application Launch artifact, we can see the user launched the MobileSMS application which included the specific date and time. This date and time could be critical to when an event took place in the investigation timeline. Additionally, this system information contains lock and unlock time(s) of the device. This deep-dive information can be critical to investigations such as automotive accidents. Showing that the driver of the vehicle was actively interacting with the device during the time of the accident can be the only item that gives a full picture of what happened and also only available in the full file system extraction.   

A screenshot showing various dates and times the state of the device was locked or unlocked.

In recalling back to the critical “Communications” section, the fact that KnowledgeC and Biome data is retrieved in the full file system extraction potentially provides additional communication information. The KnowledgeC data stores a wealth of pattern of life data, and the “AppIntents” storage could contain removed/redacted messages. Biome data (introduced in iOS 16) has multiple locations (AppIntents, SiriIntents and UserActivity) that can store the contents of sent/received messages.   

In conclusion, the full file system extraction that is available from iOS devices acquired using Magnet Verakey provides significant advantages over traditional logical extractions.   By capturing a more complete acquisition of the entire file system, you can capture data that could be critical to your examination. For this example, email, location, communication, web activity and system information were captured in the Verakey extraction that could contain the piece of information critical to the investigation and/or responsive to the legal/eDiscovery request.   

Related Resources 

Subscribe today to hear directly from Magnet Forensics on the latest product updates, industry trends, and company news.

Start modernizing your digital investigations today.

Top