Case: Deleted iPhone Messages - Firme-H2E
Skip to content
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR
Get IT Forensic Support Now
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR

Reconstruction of Deleted Messages on an iPhone in a Criminal Case

Scroll to Explore

Case Type: Criminal Law

Client: Defense Law Firm (anonymous)


Parties Involved: Public Prosecutor vs. Defendant


Mandate Assigned to H2E Firm:

Extraction and analysis of deleted messages from an iOS device seized by police


Duration of Mandate: 20 business days

Context

In a case involving accusations of threats and harassment, the public prosecutor relied on a partial set of text messages extracted from an iPhone provided by the complainant.

The defense attorney suspected that key contextual elements — especially earlier messages indicating consensual exchanges — had been deleted or omitted from the evidence submitted by the prosecution.

He commissioned H2E Firm to conduct a full extraction of the device seized from the accused to verify the presence of deleted or undisclosed messages.

H2E Firm’s Intervention

Step 1

Reception and Securing of the Device

  • Documentation of chain of custody

  • Full photographic documentation and model identification

  • Creation of a complete forensic image of the iPhone, without altering its content
Step 2

Extraction and Analysis

  • Use of Cellebrite UFED to extract deleted data

  • Processing of SQLite databases (SMS, iMessages, MMS, contacts, logs)

  • Reconstruction of partially deleted conversations

  • Verification of timestamps and metadata to detect tampering
Step 3

Report and Deliverables

  • Detailed report with chronological comparison between the prosecution’s submitted evidence and the actual messages found on the device

  • Identification of over 40 deleted messages showing cooperative and consensual tone between both parties prior to the complaint

  • Report written in a neutral, simplified format with included text excerpts and reconstructed visual captures

Result

The defense attorney used the report to request a
cross-examination on the reliability of the digital evidence.

The judge authorized the submission of H2E Firm’s report, and the complainant admitted to having deleted certain messages before handing over their phone to the police.

The public prosecutor withdrew part of the charges, stating that the overall context no longer aligned with the initial version presented.

Takeaways

  • Partial digital evidence can mislead a court, even without deliberate falsification
  • Deleted messages can often be recovered, even after some time has passed
  • A rigorous but clear and accessible technical report can dramatically change the direction
of a case

Tools Used

Cellebrite UFED
SQLite Browser
Custom forensic timeline (H2E Firm)
SHA-256 for integrity validation

Do you have a case?

Submit it securely using our platform.

No emails. No delays. Use our dedicated submission system to get expert help fast.

Submit Your Case

Your information is kept confidential and reviewed by certified experts.

Firme H2E

Legal IT Expertise Firm | Greater Montreal Area


  • Facebook
  • LinkedIn
Quick Links
  • Home
  • Our Services
  • Our Audience
  • About Us
  • Case Studies
  • Our Story
  • Blogs
  • Legal Aid
  • Anton Piller
  • FAQ’s
  • Contact
Contact Us
  • Location
    970 Demers Street, Carignan, J3L 1E9
  • Business email
    expertise@firmeh2e.com
  • Toll-free
    1-888-796-8706
  • Local
    1-450-700-4233
Stay Informed. Stay Secure.

Subscribe to stay informed about industry updates and connect with our experts.

Note: We serve all over Quebec and Canada

© 2025 Firme H2E. All rights reserved.

  • Privacy Policy
  • Terms & Conditions
Gérer consentement
Pour offrir la meilleure expérience possible, nous utilisons des technologies telles que les témoins (cookies) pour stocker et/ou accéder aux informations de votre appareil. Consentir à ces technologies nous permet de traiter des données telles que le comportement de navigation ou les identifiants uniques sur ce site. Ne pas consentir ou retirer votre consentement pourrait affecter négativement certaines fonctionnalités.
Fonctionnel Always active
Le stockage ou l accès technique est strictement nécessaire à la finalité légitime de permettre l utilisation d un service spécifique explicitement demandé par l abonné ou l utilisateur, ou dans le seul but d effectuer la transmission d une communication sur un réseau de communications électroniques.
Préférences
Le stockage ou l accès technique est nécessaire dans la finalité d intérêt légitime de stocker des préférences qui ne sont pas demandées par l abonné ou l utilisateur.
Statistiques
Le stockage ou l accès technique utilisé exclusivement à des fins statistiques. Le stockage ou l accès technique utilisé exclusivement à des fins statistiques anonymes. Sans assignation à comparaître, conformité volontaire de la part de votre fournisseur d accès à Internet ou enregistrements supplémentaires provenant d un tiers, les informations stockées ou extraites à cette seule fin ne peuvent généralement pas être utilisées pour vous identifier.
Marketing
Le stockage ou l accès technique est nécessaire pour créer des profils d utilisateurs afin d envoyer de la publicité, ou pour suivre l utilisateur sur un site web ou sur plusieurs sites web à des fins de marketing similaires.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
Voir
  • {title}
  • {title}
  • {title}