ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Catch Cheater
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Bug Sweep TSCM Investigation
      • Workers Compensation Fraud Investigation
      • Asset and Hidden Finances Investigations
    • Cyber Security
      • DIGITAL EVIDENCE AUTHENTICATION
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Assets Search 
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > Uncategorized > How the FBI Extracted Deleted Signal Messages From a Defendant’s iPhone
    How the FBI Extracted Deleted Signal Messages From a Defendant’s iPhone
    09
    Apr
    • ForensicsS
    • 0 Comments

    How the FBI Extracted Deleted Signal Messages From a Defendant’s iPhone

    Mobile forensics


    Jake Peterson

    Jake Peterson

    Senior Skills Editor

    Skills

    Jake Peterson is Lifehacker’s Tech Editor, and has been defending tech info and how-tos for nearly a decade. His team covers all things technology, including AI, smartphones, laptop programs, sport consoles, and subscriptions.

    Learn Beefy Bio



    April 9, 2026


    Add as a most in model offer on Google


    Add as a most in model offer on Google

    mobile forensics signal app

    Credit ranking: omit.cabul/Shutterstock

    Key Takeaways

    1. The FBI became capable of pull Signal messages from a defendant’s iPhone—although that user had deleted the app.
    2. The FBI tapped into the iPhone’s notification database, the put they stumbled on indicators containing incoming messages the user obtained.
    3. Signal has a setting that can block this vulnerability, however it must be enabled manually.

    Desk of Contents


    You would possibly perchance presumably need heard about Signal, the encrypted chat app the U.S. authorities infamously mild to discuss war plans last yr. (Yikes.) Nonetheless whereas the app is no different to a devoted SCIF, it is a simply option for the rest of us to keep up a correspondence extra securely. Signal makes spend of stop-to-stop encryption (E2EE), which, very simply, method that messages are “scrambled” in transit, and would possibly presumably handiest be “unscrambled” by the sender and the recipient or recipients. Whilst you are in a Signal chat, it’s possible you’ll learn incoming messages precise admire it’s possible you’ll any varied chat app—whereas you’re an attacker, and intercept that message, all it’s possible you’ll web is a jumble of code.

    E2EE makes it subtle for somebody without your unlocked tool (or your unlocked Signal app) to learn your Signal message—subtle, no longer no longer doable. That is fragment of the explanation the chat app is no option for presidency officers (though no third-birthday party chat app would possibly presumably be). Nonetheless it’s furthermore a simply reminder that no matter who you are, your true chats are no longer impervious to outside forces. If someone needs to interrupt into your chats, they would possibly presumably simply web a formulation to develop so.

    The FBI as of late recovered deleted Signal messages from an iPhone

    Working instance: As reported by 404 Media, the FBI as of late extracted incoming Signal messages from a defendant’s iPhone. The user had even deleted the app off their tool, which handiest added one other hurdle into the investigators’ needs. That you can teach by deleting the app itself, your encrypted messages would possibly presumably be protected. As it appears, however, the FBI didn’t want to win admission to the Signal app the least bit. While they weren’t capable of retrieve the defendant’s outgoing messages, they had been capable of jam incoming messages from the iPhone’s push notification database. (I’ve been defending iPhones for nearly a decade, and I wasn’t unsleeping that iOS even had a push notification database—though I teach it’s miles wise, on condition that indicators exist in Notification Center till you manually launch or brush apart them.)

    This revelation comes from a case nice looking a team allegedly vandalizing property and setting off fireworks on the ICE Prairieland Detention Facility. One officer enthusiastic in regards to the altercation became shot in the neck. In accordance with a supporter of the defendants in this case who took notes right by the trial, the court learned that any app that has permission to inform previews and indicators on the Lock Shroud will save these previews to the interior reminiscence of the user’s iPhone. As such, the FBI became capable of develop messages the defendant had obtained, although these messages had been jam to depart in the app, and the app had been cleared from the tool.

    All another time, that is no longer a security hole queer to Signal: Any app that displays an alert on your Lock Shroud has this vulnerability. The FBI doubtlessly had quite quite a bit of varied notifications to sift by as successfully, from any app the defendant had running on their iPhone. Mediate the indicators you would possibly presumably need sitting in Notification Center factual now: texts, reminders, info bulletins, purchases, DMs, etc. All of that will perchance presumably be fodder for somebody with the surveillance tech to root by your iPhone—locked or no longer.

    Easy methods to stop this from going on to you

    Whilst you spend Signal, you definitely fill an advantage right here, now that about this vulnerability. Signal has a setting that blocks the whisper of messages from exhibiting in their notifications. That formulation, even though someone accesses your indicators, all they’ll review is you obtained a Signal message—no longer who despatched it or what it contains.

    To present it on, launch Signal, faucet your profile in the tip-left nook, then hit “Settings.” Under Notification Impart, pick “No Name or Content” to block all info to the alert. You would possibly perchance presumably compromise right here and pick “Name Only” whereas you would admire to grab who a message is from sooner than you launch it—precise be unsleeping, an interloper would possibly presumably furthermore review you obtained a message from that particular person in the event that they jam your iPhone’s notifications.

    The Download Newsletter
    Never omit a tech account

    mobile forensics Jake Peterson portrait
    Jake Peterson

    Receive the most recent tech info, evaluations, and recommendation from Jake and the team.

    The Download NewsletterNever omit a tech account.
    Receive the most recent tech info, evaluations, and recommendation from Jake and the team.

    Learn More

    • Tags

    • cybercrime Deleted email-fraud Extracted forensics|digital-forensics Investigation malware online-scam private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker

    Recent Posts

    • Crypto Scams and Senior Fraud Drive $21 Billion in 2025 Cyber Theft, FBI Experiences
    • Individuals misplaced $11B to crypto scams in 2025, says FBI
    • Montreal man arrested for allegedly serving to Ryan Marriage ceremony video display informant to loss of life
    • FBI search of Georgia election areas of work relied on years-frail claims of fraud, affidavit presentations
    • Montreal man arrested over alleged link to Ryan Wedding: FBI

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    Crypto Scams and Senior Fraud Drive $21 Billion in 2025 Cyber Theft, FBI Experiences
    April 9, 2026
    Crypto Scams and Senior Fraud Drive $21 Billion in 2025 Cyber Theft, FBI Experiences
    Individuals misplaced $11B to crypto scams in 2025, says FBI
    April 9, 2026
    Individuals misplaced $11B to crypto scams in 2025, says FBI
    Montreal man arrested for allegedly serving to Ryan Marriage ceremony video display informant to loss of life
    April 9, 2026
    Montreal man arrested for allegedly serving to Ryan Marriage ceremony video display informant to loss of life

    Popular Tags

    administration agents Crypto cybercrime cybercrimefraud cybercrimehacker cybercrimephishing-attack cybersecurity Department digital-forensics email-fraud Epstein forensics|digital-forensics Former fraud hacker hackers House investigating Investigation investigationcybersecurity Judge Justice Korean Launches malware malwarefraud malwarephishing-attack Microsoft Minnesota North online-scam online-scamphishing-attack Patel phishing-attack Police private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker probe Trump Trump’s warns

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO