iPhone 6 — 8 / SE
Deep file-system extractions via checkm8 — the strongest recovery class still available on Apple hardware.
- checkm8
- Full FS
- Keychain

We extract iPhones across the supported range — iMessage, deleted photos, location history, app data and iCloud — and produce reports that withstand cross-examination in Australian and NZ courts.
iOS keeps far more than the user sees — message journals, deleted-row remnants, location pings, app caches and synced cloud copies. We work each one and reconcile them into a single timeline.
Active and deleted iMessage, SMS and MMS recovered from chat.db, including attachments, reactions and edited-message history.
Camera roll, screenshots, deleted-recently and synced iCloud Photos — with original EXIF, timestamps and location metadata.
Significant Locations, Frequent Locations, Maps history, Find My data and per-app location traces with timestamps.
WhatsApp, Signal, Telegram, Snapchat, TikTok, Tinder, Hinge — chats, contacts, media and call logs decoded.
Lawful iCloud collection, encrypted iTunes backups and Mac sync data — full file-system where access permits.
Screen Time, KnowledgeC, biome and Health database analysed for activity, presence and behavioural timeline.
Different iPhones unlock at different forensic depths. We tell you upfront what's realistically achievable for the model, iOS version and lock state in front of us.
Deep file-system extractions via checkm8 — the strongest recovery class still available on Apple hardware.
AFU and BFU agent-based acquisition, with passcode brute-force on supported models where lawful.
Latest agent and cloud workflows for current iOS — including iCloud, iTunes backup and logical extraction paths.
Where lawful: brute-force on supported models. Where not: cloud and backup paths to surface evidence.
Our iPhone work uses the same forensic platforms relied on by Australian law enforcement — agent-based acquisition, checkm8-class extractions, validated cloud collection and hash-verified imaging.
Every step is documented. Nothing is opened on a live device. The output is an exhibit pack a magistrate, judge or arbitrator can rely on.
iPhone 6 → 15 PM
Through iOS 18
500+ decoded
Hash-verified
Confidential brief, lawful authority confirmed, model and iOS version checked, fixed-fee quote provided.
Agent, AFU/BFU or cloud collection in our lab. Hashes captured. Chain of custody opened.
SQLite, keychain and app stores parsed; deleted records carved; timeline reconciled across sources.
Plain-English findings with annotated exhibits. Expert testimony available where required.
Every enquiry is read by a licensed investigator and treated in strict confidence.
A short note about your matter — no detail required upfront.
From a licensed investigator, not a chatbot or call centre.
Confidential. No obligation. Fixed-fee quote where possible.