What Physical Extraction Gets You
Physical extraction creates a bit-for-bit copy of the device storage including deleted files, unallocated space and encrypted partitions. It recovers data the user deleted weeks or months ago. It accesses file system areas invisible to the operating system. In extreme cases, chip-off forensics desolders the memory chip from the circuit board for direct imaging. This is Cellebrite's core advantage and the primary reason law enforcement pays $15,000+ per year.
What Logical Acquisition Gets You
Logical acquisition captures everything currently on the device: SMS and MMS messages, contacts, call logs, photos, videos, audio files, installed applications, browser history, Wi-Fi configurations and device accounts. That is the data most people think of when they picture "what is on this phone."
But logical acquisition also reaches data not visible in the device UI. App SQLite databases containing message histories and transaction records. Cached data from applications that the user never explicitly saved. System logs recording device events and errors. Tombstone crash files. App-specific datastores that hold configuration data and session information. Most users do not know this data exists. A forensic examiner extracting it via ADB gets a substantially deeper picture than what appears on screen.
The Real Question
Are you paying $15,000 per year for deleted data recovery that you need on 5% of your cases?
Run the numbers on your last 20 cases. How many required recovery of deleted data from unallocated storage? How many required bypass of a locked device? How many involved a suspect phone versus a cooperating client's phone?
For 90%+ of civil litigation, HR investigations, insurance fraud cases and corporate examinations, the evidence you need is on the device right now. The client hands you an unlocked phone. You need to extract what is there and document it forensically. You do not need exploit research teams. You do not need chip-off hardware. You do not need a $15,000 annual subscription.
The iPhone Reality
This is information that Cellebrite sales representatives will not volunteer. iOS Lockdown Mode, introduced in iOS 16, disables USB data transfer entirely when the device is locked. USB Restricted Mode kills data access after one hour of inactivity. These are not theoretical protections. They are active on every modern iPhone.
Cellebrite cannot reliably crack iPhones running iOS 17.4 or later on A12 or newer chips. That covers every iPhone model from the iPhone XS (2018) forward. iPhone 15 and iPhone 16 on current iOS are effectively uncrackable by any commercial forensic tool. GrayKey faces the same limitations. Apple's Secure Enclave combined with hardware-fused encryption keys creates a barrier that no vendor has publicly demonstrated consistent bypass against.
For locked, up-to-date iPhones: nobody extracts deleted data reliably. Not Cellebrite. Not GrayKey. Not any tool you can purchase commercially. For unlocked iPhones with a known passcode, logical acquisition captures everything an examiner needs for most investigations. The $15,000 premium buys you capability against older iOS versions and older hardware. Against current devices, the playing field is level.
For independent analysis of mobile device security, refer to Apple Platform Security documentation and Android Security documentation.