The honest answer for counsel
Deleted SMS, iMessage, and WhatsApp content is sometimes recoverable, often not, and the difference comes down to the device, the OS version, the time elapsed, and whether the user did anything anti-forensic between deletion and acquisition. This article maps what actually recovers — and what your forensic expert should be telling the court before they promise anything.
iPhone (iMessage / SMS)
- Recently-deleted folder (iOS 16+). 30-day soft delete in the Messages app. If the user did not "Recently Deleted → Delete All," the messages are right there. We recover from the live device or a forensic image.
- SQLite database (sms.db). The Messages database holds the full message store. Deleted rows leave artifacts in the SQLite WAL (write-ahead log) and free pagesfor a window of time — sometimes days, sometimes weeks — until SQLite vacuums or overwrites them.
- iCloud Backup. If iCloud Messages is OFF, full message history sits in the most recent iCloud backup. Subpoenable from Apple under proper process.
- iCloud Messages (sync). If ON, Apple does not retain a separate copy beyond the user's devices. Deletion on one synced device deletes everywhere.
Android (SMS, RCS, app messages)
- SMS / MMS. Stored in the OS messaging database. Deletion is usually immediate, but Cellebrite Premium or Magnet Axiom can recover deleted SMS rows fromunallocated database pages on many Android builds, especially when the device has not been factory-reset.
- Google Backup / Drive backup. If the user enabled SMS backup, the history sits in their Google account. Discoverable via Google Takeout or subpoena.
- WhatsApp. End-to-end encrypted, but the local SQLite database is recoverable from the device. Cloud backups (iCloud/Google Drive) are commonly unencrypted unless the user enabled E2E backups (a 2021+ option). When the cloud backup is unencrypted, full deleted-message recovery is straightforward.
- Signal. Significantly harder by design. Local DB is encrypted with a key in the Android Keystore / iOS Keychain. Modern forensic tools handle some versions; others remain out of reach.
What kills recovery
- Factory reset. Almost certainly destroys deleted-message recovery on modern OS versions because the encryption key is rotated.
- "Erase all content and settings" on iPhone. Same effect. Recovery beyond iCloud backup becomes impossible.
- Heavy device use after deletion. Free database pages get overwritten as the user keeps texting, taking photos, installing apps.
- iOS major-version upgrade. File system migrations have wiped recovery opportunities in past iOS releases.
Authentication for court (FRE 901/902)
Recovered messages must be authenticated before a court will admit them. Federal Rule of Evidence 901 requires evidence sufficient to support a finding that the item is what the proponent claims. Practical authentication methods:
- Hash verification of the forensic image — proof the analyzed copy is identical to the seized device
- Chain of custody — every hand-off documented
- Tool validation — your expert states the version, configuration, and known limitations of the extraction tool
- Corroborative artifacts — phone numbers, account IDs, message timestamps cross-referenced with carrier records or other devices
- Expert testimony under Rule 702 — your forensic examiner explains the methodology and defends it on cross
Some federal courts now accept Rule 902(14) self-authentication for digital evidence accompanied by a certification from a qualified person — useful when expert testimony at trial is impractical.
Spoliation when the other side deletes
If discovery shows messages were deleted after a preservation letter or after litigation was reasonably anticipated, you have a spoliation case. See our piece on spoliation in family law for what your expert should look for and how to brief the motion.
Questions to ask a forensic examiner before retention
- What tools will you use, and which versions are in your kit?
- What certifications do you hold (GCFE, GCFA, EnCE, CCE, CFCE)?
- Have you testified as an expert? In what jurisdictions? Any Daubert challenges?
- What is your protocol if the device is locked or encrypted?
- What will you NOT be able to recover, given what we know about the device?
- How will the report be structured for admissibility under our local rules?
What we deliver
Forensic phone extraction withcourt-admissible reporting, expert-witness availability, and engagement directly with counsel under attorney-work-product privilege. We also handle cybersecurity expert witness work for litigation that needs deposition and trial testimony.















