Police Magazine Logo
MenuMENU
SearchSEARCH

New Book Details How to Retrieve Forensic Data from an iPhone

"Phone Forensics," Jonathan Zdziarsk supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. Intended for lawful forensic examination of devices by corporate security officers, law enforcement personnel, and private forensic examiners.

October 8, 2008
2 min to read


In "iPhone Forensics," Jonathan Zdziarsk supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. Intended for lawful forensic examination of devices by corporate security officers, law enforcement personnel, and private forensic examiners, the book introduces readers to digital forensics and outlines the technical procedures needed to recover low-level data from the iPhone. Federal, state, and multinational agencies have helped to test and verify the procedures outlined in the book, and that information is now available for the private sector.

This book helps you:

    * Determine what type of data is stored on the device
    * Break v1.x and v2.x passcode-protected iPhones to gain access to the device
    * Build a custom recovery toolkit for the iPhone
    * Interrupt iPhone 3G's "secure wipe" process
    * Conduct data recovery of a v1.x and v2.x iPhone user disk partition, and preserve and recover the entire raw user disk partition
    * Recover deleted voicemail, images, email, and other personal data, using data carving techniques
    * Recover geotagged metadata from camera photos
    * Discover Google map lookups, typing cache, and other data stored on the live file system
    * Extract contact information from the iPhone's database
    * Use different recovery strategies based on case needs, and more

iPhone Forensics includes techniques used by more than 200 law enforcement agencies worldwide, and is a must-have for any corporate compliance and disaster recovery plan.

"This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity." Andrew Sheldon, director of Evidence Talks, computer forensics expert.

Jonathan Zdziarski is better known as the hacker "NerveGas" in the iPhone development community. He is well known for his work in cracking the iPhone and lead the effort to port the first open source applications. Hailed on many geek news sites for his accomplishments, Jonathan is best known for the first application to illustrate and take full advantage of the major iPhone APIs: NES.app, a portable Nintendo Entertainment System emulator.

More Technology

Close-up of a person holding an Axis body-worn camera toward the viewer. The camera is in sharp focus, while the person wearing a dark uniform appears blurred in the background outdoors.
TechnologyMay 7, 2026

Case Study Details Integration of Body-Worn Cameras with CAD

The Billerica Police Department (Massachusetts) improved transparency and accountability, sharpened evidence management, and reduced manual hours by integrating Axis body-worn cameras with its Computer-Aided Dispatch (CAD) system.

Read More →
Dark map of downtown Chicago displaying three emergency alerts for reported gunfire near Randolph Street, W Harrison Street, and N Columbus Drive. Blue circular markers indicate locations near Union Park, Clark Art Museum, and Jack Academy High School.
TechnologyMay 7, 2026

ZeroEyes Public Safety Alerts Integrates Samdesk for Real-Time Risk Detection and Awareness

ZeroEyes has integrated Samdesk into its Public Safety Alerts platform to deliver faster, verified intelligence to help organizations understand emerging risks and respond quickly.

Read More →
High-angle view of cars with lights turned on crossing the George Washington Bridge at dusk.
TechnologyMay 7, 2026

NJ Police Department Combines Strong Technology & Public Safety Strategy

The Fort Lee Police Department in New Jersey has modernized with Genetec Security Center, including video management, automatic license plate recognition (ALPR), and Clearance digital evidence management.

Read More →
Ad Loading...
Graphic with image of crime scene investigator and yellow evidence markers and black box covering the persons idenity and headline Automated Redaction.
TechnologyApril 30, 2026

Pimloc & Dynamic Workflow Solutions Partner to Deliver Data Management and Automated Redaction

The joint redaction solution from Pimloc and Dynamic Workflow Solutions helps agencies reduce FOIA response time and compliance risk by automatically redacting faces, license plates, and other sensitive information from digital evidence.

Read More →
Fans cheer at Saban Field at Bryant-Denny Stadium during a football game at The University of Alabama.
TechnologyApril 23, 2026

The University of Alabama Rolls Out Couter-Drone Technology

The University of Alabama is using D-Fend Solutions as a counter-drone technology supplier for campus and game-day airspace security. The University integrates D-Fend’s EnforceAir into its Emergency Operations Center (EOC), utilizing a unified command framework to collaborate with local, state, and federal partners during major events.

Read More →
Man working in front of multiple computer screens.
TechnologyApril 22, 2026

Motorola Solutions Now Part of the Cyber Threat Alliance

Motorola Solutions is now part of the Cyber Threat Alliance, the first formally organized nonprofit group of cybersecurity practitioners that work together in good faith to share threat information and improve global defenses against advanced cyber adversaries.

Read More →
Ad Loading...
Bar chart showing what police departments spend budget on for security.
TechnologyApril 22, 2026

Genetec 2026 State of Physical Security Report Reveals Public Safety Priorities & Challenges

Survey results from Genetec’s 2026 State of Physical Security Report highlight the demand for integrated systems that improve response times and reduce investigative workload. Nearly nine in 10 respondents said they use security data to help keep officers safe.

Read More →
Tinted blue background image of traffic with inset images for an ALPR camera, a police dispatcher, and a logo for Flock Safety.
TechnologyApril 16, 2026

Flock Safety Introduces Audit Assistance, Its Latest Trust & Compliance Tool

Audit Assistance is the latest tool in the Flock Trust & Compliance suite, a first-of-its-kind set of products and services that provides communities with guardrails and customization for accountability, transparency, and responsible use of the Flock platform.

Read More →
image of one closed laptop and one open laptop with Toughbook logo on screen, all against a blue gradient background
TechnologyApril 16, 2026

Panasonic Connect Launches the Toughbook 56

The Toughbook 56, the latest rugged laptop from Panasonic Connect, delivers enhanced performance, refined design, new levels of security, and power-efficient workflows in demanding environments.

Read More →
Ad Loading...
Collection of traffic control signs against a city backdrop and logos for Radarsign and Sourcewell.
TechnologyApril 16, 2026

Radarsign Awarded Sourcewell Contract Expanding Access to Traffic Safety Solutions

Radarsign’s traffic safety portfolio, including radar speed signs, flashing beacon systems, and more, are now available through Sourcewell purchasing contracts.

Read More →