In previous chapters, we discussed how to obtain logical data and analyze the acquired data. The iDevice (iPhone, iPod Touch, iPad) was developed by Apple in such a way that the system is jailed (or closed), which, in UNIX terms, gives the ability to create a partitioned operating system. On iDevices, the operating system partition is read-only, and this makes the device a jailed system. This, coupled with using the root model found in Unix systems, provides for a secure system. In this situation, the iDevice’s mobile user has defined and limited access to certain areas of the iOS. Since the first iPhone came out, some people have taken it upon themselves to develop methods to break that jailed system, which has lead to the development of numerous unsupported versions of iOS and jailbreaks. Law enforcement agencies then demanded that they get access to the physical device, as traditional methods of forensics began to fade away in the wake of the iPhone. Numerous arguments arose in areas from digital rights management, to copyright violations, to poor decisions being handed down by Apple. This chapter will discuss relevant case law, as well as procedures and tools to exploit iDevices.


Medium Exploitation Digital Right Management Digital Right Management System Digital Millennium Copyright Jailed System 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Sean Morrissey 2010

Authors and Affiliations

  • Sean Morrissey

There are no affiliations available

Personalised recommendations