- Nationwide Digital Forensic & Cyber Services
- BOOK A FREE CONSULTATION TODAY!
“Extraction type” is a shorthand for how data is collected from a phone and what level of access the examiner had at the time. Modern iOS and Android devices use strong encryption and security states that can dramatically change what is available. For the broad foundation first, start here: What is Cell Phone Forensics and How Does It Work?
This page is an educational glossary-style deep dive on extraction categories and device states. If you want the complete “start-to-finish” service overview of how mobile work is scoped, acquired, analyzed, and reported, see our main hub: Cell Phone Forensics. If you want a broader tool-and-vendor overview (and why different tools label “the same thing” differently), see: Cell Phone Forensic Tools & Software.
Key principle: The most accurate way to describe an extraction is not the marketing label, but the data categories actually obtained and the device state at the time of collection.
These labels are commonly used across mobile forensic tooling. Exact contents vary by device, OS version, encryption state, and method.
A logical extraction generally means the examiner collected user-level data that the operating system (or a supported API) will provide. This is often the most “compatible” method, but also the most limited.
A file system extraction generally means broader access to the device’s file hierarchy (including more app containers and system artifacts), subject to encryption and lock state.
“Full file system” is often used to describe the most complete practical collection that modern tools can obtain on many devices—especially newer phones— when lawful access conditions exist (most commonly, the device can be unlocked).
In many modern cases, “full file system” is the de facto target because traditional “raw physical” access is frequently blocked by encryption and security controls.
Historically, a “physical” extraction referred to low-level access (often described as a bit-for-bit image of storage). On modern, encrypted devices, that concept is frequently not attainable in a meaningful way without specialized conditions.
Many misunderstandings about mobile forensics come from ignoring device state. Two phones can be the same model and OS, but yield different results depending on whether the device has been unlocked since boot.
Examiner best practice is to document the observed lock state and clearly describe how that state impacts the completeness of the extraction.
Logical is often sufficient for narrow questions, but it can be incomplete for disputes that require deep validation or app-level timelines.
This tier generally enables stronger cross-validation: app records + system context + timestamps can be reconciled and explained.
checkm8 is a bootrom-level exploit affecting certain older Apple devices (chip generations A5 through A11). Because it exists in hardware bootrom, it is often described as “unpatchable” on those devices. In forensic contexts, checkm8-derived techniques can sometimes enable enhanced acquisition pathways on eligible devices—though results still depend on the device’s security configuration and the method used.
Important: “Eligible for checkm8” does not automatically mean “full physical image is possible.” Encryption and lock state still govern what is readable.
The iOS version range that a checkm8-based acquisition supports is not a single universal number—it depends on the specific toolchain and method. Some forensic tooling advertises checkm8-based extraction coverage for select devices across a wide range of iOS versions, while jailbreak tooling has its own version constraints.
If you want the broader mobile forensic “tool ecosystem” and what common labels mean in reports, see: cell phone forensic tools and software.
Modern iOS and Android devices use hardware-backed encryption and security controls designed to prevent low-level acquisition from yielding readable data. In many cases, the most defensible and useful approach is a full file system extraction (when lawful access is possible) paired with careful artifact analysis.
For a full overview of how these choices are applied in real investigations, see: cell phone forensics services.
Elite Digital Forensics is a Professional Digital Forensics and Cyber Consulting Company that provides services nationwide.
Elite Digital Forensics Assistant
By submitting this form, you consent to be contacted by email, text, or phone. Your information is kept secure and confidential. Reply Stop to opt out at anytime.
IMPORTANT: Please remember to check your spam or junk folder