Case: Deleted iPhone Messages - Firme-H2E
Skip to content
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR
Get IT Forensic Support Now
Firme-H2E
  • Our Services
    • Cyber Investigation and Computer Forensics
    • IT Expertise & Legal Support
    • IT Data Visualization
    • IT Disputes and Projects
    • E-Reputation
    • Prevention & Training
    • ──────────────────
    • ──────────────────
    • ──────────────────
    • Legal Aid
    • Anton Piller Orders
  • About Us
    • Our Story
    • FAQ
  • Case Studies
    • Case: Deleted iPhone Messages
    • Case: Software Contract Dispute
    • Case: Screenshot Falsification
    • Case: Server Damage Insurance
    • Case: Cryptocurrency Fraud
    • Case: Police Report Counter-Expertise
  • Our Audience
    • Lawyers
    • Investigators
    • Insurance Adjusters
  • Blog
  • Estimate
  • Contact
  • FR

Reconstruction of Deleted Messages on an iPhone in a Criminal Case

Scroll to Explore

Case Type: Criminal Law

Client: Defense Law Firm (anonymous)


Parties Involved: Public Prosecutor vs. Defendant


Mandate Assigned to H2E Firm:

Extraction and analysis of deleted messages from an iOS device seized by police


Duration of Mandate: 20 business days

Context

In a case involving accusations of threats and harassment, the public prosecutor relied on a partial set of text messages extracted from an iPhone provided by the complainant.

The defense attorney suspected that key contextual elements — especially earlier messages indicating consensual exchanges — had been deleted or omitted from the evidence submitted by the prosecution.

He commissioned H2E Firm to conduct a full extraction of the device seized from the accused to verify the presence of deleted or undisclosed messages.

H2E Firm’s Intervention

Step 1

Reception and Securing of the Device

  • Documentation of chain of custody

  • Full photographic documentation and model identification

  • Creation of a complete forensic image of the iPhone, without altering its content
Step 2

Extraction and Analysis

  • Use of Cellebrite UFED to extract deleted data

  • Processing of SQLite databases (SMS, iMessages, MMS, contacts, logs)

  • Reconstruction of partially deleted conversations

  • Verification of timestamps and metadata to detect tampering
Step 3

Report and Deliverables

  • Detailed report with chronological comparison between the prosecution’s submitted evidence and the actual messages found on the device

  • Identification of over 40 deleted messages showing cooperative and consensual tone between both parties prior to the complaint

  • Report written in a neutral, simplified format with included text excerpts and reconstructed visual captures

Result

The defense attorney used the report to request a
cross-examination on the reliability of the digital evidence.

The judge authorized the submission of H2E Firm’s report, and the complainant admitted to having deleted certain messages before handing over their phone to the police.

The public prosecutor withdrew part of the charges, stating that the overall context no longer aligned with the initial version presented.

Takeaways

  • Partial digital evidence can mislead a court, even without deliberate falsification
  • Deleted messages can often be recovered, even after some time has passed
  • A rigorous but clear and accessible technical report can dramatically change the direction
of a case

Tools Used

Cellebrite UFED
SQLite Browser
Custom forensic timeline (H2E Firm)
SHA-256 for integrity validation

Do you have a case?

Submit it securely using our platform.

No emails. No delays. Use our dedicated submission system to get expert help fast.

Submit Your Case

Your information is kept confidential and reviewed by certified experts.

Firme H2E

Legal IT Expertise Firm | Greater Montreal Area


  • Facebook
  • LinkedIn
Quick Links
  • Home
  • Our Services
  • Our Audience
  • About Us
  • Case Studies
  • Our Story
  • Blogs
  • Legal Aid
  • Anton Piller
  • FAQ’s
  • Contact
Contact Us
  • Location
    970 Demers Street, Carignan, J3L 1E9
  • Business email
    expertise@firmeh2e.com
  • Toll-free
    1-888-796-8706
  • Local
    1-450-700-4233
Stay Informed. Stay Secure.

Subscribe to stay informed about industry updates and connect with our experts.

Note: We serve all over Quebec and Canada

© 2025 Firme H2E. All rights reserved.

  • Privacy Policy
  • Terms & Conditions
Manage consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}