Mobile device evidence is often discussed as though it were static: either a phone is locked or it is not; either data is available or it is not. In reality, modern smartphones operate in distinct cryptographic states, and those states fundamentally affect what evidence can be accessed, interpreted, and defended in court.
Two terms appear frequently in forensic reports and testimony: BFU (Before First Unlock) and AFU (After First Unlock). They sound simple. They are not.
For attorneys litigating criminal or civil matters, misunderstanding BFU vs AFU can lead to overestimating the completeness of evidence, misinterpreting missing data, and accepting conclusions that are stronger than the underlying facts support. This article explains what BFU and AFU actually mean, how they differ between iPhones and Android devices, and why these states matter in court.
What BFU and AFU Really Describe
BFU and AFU do not describe whether a screen is currently locked. They describe whether encryption keys derived from the user's passcode have been loaded into memory since the device last booted [1]. That distinction matters more than most non-specialists realize.
When examining mobile device evidence, attorneys must understand that these mobile device encryption states determine data accessibility, not the simple presence or absence of a lock screen. Understanding phone lock states requires recognizing the difference between screen locks and cryptographic states. This technical nuance can make or break a case when evidence appears incomplete or missing.
iPhone: BFU and AFU Are Cleanly Defined
Apple's ecosystem is tightly controlled. As a result, BFU and AFU behave consistently across devices [2]. Understanding iPhone encryption states is essential for forensic examiners. This consistency makes iPhone forensics more predictable than Android forensics, but it also means that BFU conditions are extremely restrictive.
iPhone — BFU (Before First Unlock)
iPhone BFU Definition
The iPhone has been powered on or rebooted, but the user has not entered the passcode. This state persists until the first successful authentication occurs.
iPhone BFU Cryptographic State
In BFU, passcode-derived keys are not available. The Secure Enclave has not released class keys, and most encrypted data remains inaccessible [3]. The device's hardware security module maintains strict control over key release.
iPhone BFU: What Is Typically Accessible
Forensic examiners can typically access limited system metadata, basic filesystem structure, and device configuration information. However, this represents only a fraction of the device's total data.
iPhone BFU: What Is Not Accessible
Messages, app data, photos, and most keychain items remain encrypted and inaccessible in BFU. This includes virtually all user-generated content and personal information.
iPhone BFU Courtroom Implication
BFU on iOS is an extremely restrictive state. If an iPhone was in BFU at the time of acquisition, the absence of user data is expected behavior, not evidence of deletion or spoliation. Attorneys must recognize this distinction when evaluating forensic reports or challenging expert testimony.
iPhone — AFU (After First Unlock)
iPhone AFU Definition
The user has entered the passcode at least once since the last reboot. Importantly, the phone may later be locked again. As long as it has not rebooted, it remains in AFU.
iPhone AFU Cryptographic State
In AFU, passcode-derived keys are loaded into memory. The Secure Enclave releases data protection class keys, and protected files become available according to their class [3]. This state persists across screen locks until the device reboots.
iPhone AFU: What Is Typically Accessible
Forensic examiners can typically access app data, messages (subject to data protection class), photos, and many keychain items. The scope of accessible data depends on the specific data protection class assigned to each file.
iPhone AFU Courtroom Implication
AFU is the critical threshold for meaningful iPhone evidence. Most forensic extractions rely on the device being in AFU, even if the screen is locked. Attorneys should verify that forensic examiners documented the device's encryption state at the time of acquisition.
Android: BFU and AFU Exist — But They Are More Complicated
Android uses File-Based Encryption (FBE), which splits storage into different zones [4]. Android file-based encryption creates a more complex environment than iOS. This makes BFU and AFU less intuitive and more fragmented than on iOS. The Android ecosystem's diversity across manufacturers and versions further complicates forensic analysis.
Android Encryption Basics: DE vs CE
Modern Android devices separate data into Device Encrypted (DE) storage and Credential Encrypted (CE) storage [4]. This distinction is the foundation for understanding Android BFU and AFU.
A useful mental model is that DE is the “lobby” that can be accessed before the user authenticates, while CE is the “locked offices” that require the user’s credentials to open.
Device Encrypted (DE) Storage
DE storage is available in BFU. It contains system data and limited app artifacts that are marked as "direct boot aware." This allows certain system functions to operate even before user authentication.
Credential Encrypted (CE) Storage
CE storage is available only in AFU. It contains most user data, including messages, app databases, media files, and personal documents. This separation enables Android's Direct Boot feature while maintaining strong security for user data.
Android — BFU (Before First Unlock)
Android BFU Definition
The device has booted, but the user has not entered their PIN, password, or pattern. The operating system is fully running, but user data remains encrypted.
Android BFU Cryptographic State
In BFU, DE storage is accessible, but CE storage remains encrypted. The operating system can perform basic functions, but user data is protected.
Android BFU: What Is Typically Accessible
Forensic examiners can typically access system logs, device configuration, installed app lists, and limited app artifacts marked as "direct boot aware." This represents more data than iPhone BFU, but still excludes most user content.
Android BFU: What Is Not Accessible
Messages, app databases, user files, media, and most account tokens remain encrypted and inaccessible in BFU. Despite the device appearing functional, most evidentiary data remains sealed.
Why Android BFU Is Confusing
Android devices may receive calls, show notifications, and run background services in BFU. This gives the appearance of access, even though most evidentiary data remains sealed. Attorneys must understand that functionality does not equate to data accessibility.
Android BFU Courtroom Implication
BFU on Android often yields more artifacts than BFU on iPhone, but still excludes most user content. Missing data in BFU should not be treated as proof of deletion. Forensic reports should clearly distinguish between DE and CE storage accessibility.
Android — AFU (After First Unlock)
Android AFU Definition
The user has unlocked the device at least once since boot. This state persists until the next reboot, regardless of subsequent screen locks.
Android AFU Cryptographic State
In AFU, CE storage is unlocked, user profiles are mounted, and app data becomes accessible. However, this does not guarantee complete access to all data on the device.
Android AFU: What Is Typically Accessible
Forensic examiners can typically access messages, app databases, media files, and user documents. The scope depends on the specific user profile and encryption settings.
Android AFU: Critical Difference from iPhone
AFU on Android is not necessarily complete. Multiple user profiles, work profiles, and manufacturer-specific security features can create partial AFU conditions that limit data accessibility.
Partial AFU: The Android Trap
Android supports multiple users, work profiles, Secure Folder (Samsung), and app-level encryption using hardware-backed keystores [5]. Each of these can remain locked even when the primary user has unlocked the phone.
What This Means Legally
An Android phone can be AFU for the primary user while remaining BFU for a work profile, BFU for Secure Folder, and partially inaccessible at the app level. This creates complex forensic scenarios that require careful documentation and explanation.
In forensic reports, this often appears as missing conversations, incomplete datasets, and partial timelines. All of which can be misinterpreted if BFU vs AFU is treated as binary. Attorneys must question forensic examiners about partial AFU conditions and their impact on evidence completeness.
Real-World Implications
Consider a case involving a corporate device with a work profile. The primary user may have unlocked their personal profile, making it AFU. However, the work profile may remain in BFU, preventing access to work-related communications and documents. This partial access can significantly impact the scope of discoverable evidence.
Similarly, Samsung's Secure Folder feature creates an additional encryption layer that requires separate authentication. Even when the main device is AFU, Secure Folder contents remain encrypted until the user authenticates to that specific container.
Reboots Matter More Than Locks
One of the most important, and least understood, facts: a reboot forces BFU. A locked screen does not. This is true for both iPhone and Android devices [1].
From an evidentiary standpoint, power loss, battery depletion, manual shutdown, and forced restart can all destroy AFU conditions. This means that improper device handling can permanently prevent access to encrypted data.
For attorneys, this means evidence availability may hinge on device handling, gaps in data may be procedural rather than intentional, and chain-of-custody details matter enormously. Every reboot event should be documented in forensic reports and chain-of-custody logs.
Chain of Custody Considerations
When a device is seized, the handling procedures can determine whether AFU access is maintained. If law enforcement or investigators reboot the device, they may inadvertently transition it from AFU to BFU, losing access to encrypted data. Attorneys should examine chain-of-custody documentation to identify any reboot events and assess their impact on evidence availability.
Forensic Tools Depend on AFU — But Rarely Explain It Well
Most commercial forensic tools extract significantly more data in AFU conditions and produce limited results in BFU [1]. However, forensic reports often do not clearly state BFU vs AFU, do not explain partial AFU conditions, and do not qualify conclusions based on encryption state.
This creates risk when conclusions are presented without context. Effective phone encryption forensics requires understanding these encryption states and their impact on data accessibility. Attorneys must ensure that forensic reports explicitly document the device's encryption state at the time of acquisition and explain how that state affected data accessibility.
Questions to Ask Forensic Examiners
When reviewing forensic reports or preparing for expert testimony, attorneys should ask:
- Was the device in BFU or AFU at the time of acquisition?
- Which user profiles were unlocked?
- Was Secure Folder or similar encryption containers present?
- What data could not be accessed, and why?
- How did the encryption state affect the scope of the examination?
These questions are not technical trivia. They go directly to the reliability and completeness of the forensic analysis.
Why BFU and AFU Matter in Court
Understanding these states affects multiple aspects of litigation, from evidence interpretation to expert cross-examination. The encryption state of a device at the time of forensic examination fundamentally determines what evidence exists and what conclusions can be drawn.
Interpretation of Missing Data
Missing messages may reflect encryption state, not deletion. Absent photos may reside in locked containers. Attorneys must distinguish between data that was deleted and data that was simply inaccessible due to encryption state.
When forensic reports indicate missing data, attorneys should investigate whether BFU conditions or partial AFU states explain the absence. This distinction can be critical in cases where data deletion is alleged or where spoliation claims are made.
Suppression and Motion Practice
Device handling errors can materially affect evidence access. Improper reboots may destroy exculpatory data. Attorneys should examine whether proper procedures were followed during device seizure and examination.
If evidence was lost due to improper handling that caused an unintended transition from AFU to BFU, suppression motions may be appropriate. Similarly, if forensic examiners failed to document encryption states or explain data limitations, the reliability of their conclusions may be challenged.
Expert Cross-Examination
Effective cross-examination requires understanding BFU vs AFU. Key questions include: "Was the device in BFU or AFU?" "Which user profiles were unlocked?" "Was Secure Folder present?" "What data could not be accessed, and why?"
These questions test the expert's technical knowledge and the thoroughness of their examination. Experts who cannot clearly explain encryption states and their impact on data accessibility may lack the technical competence required for reliable testimony.
Practical Takeaways for Attorneys
Several key principles should guide attorneys when dealing with mobile device evidence:
- BFU and AFU are cryptographic states, not screen states
- iPhone BFU is extremely restrictive; Android BFU is deceptively permissive
- Android AFU may still be partial due to multiple profiles and encryption containers
- Reboots are evidentiary events that can destroy AFU conditions
- Missing data is often explainable without misconduct
Strong experts explain these limitations proactively. Weak ones gloss over them. Attorneys should evaluate forensic reports based on whether they clearly document encryption states and explain data limitations.
Hypothetical Scenario: The Importance of Understanding Encryption States
Consider a common scenario in civil litigation: opposing counsel presents a forensic report showing "incomplete" message data from an Android device. The report suggests that messages may have been deleted. However, upon cross-examination, the forensic examiner admits that the device was in BFU at the time of acquisition and that the work profile had never been unlocked.
This revelation changes the case entirely. The "missing" messages were not deleted; they were simply inaccessible due to encryption state. The forensic examiner's failure to clearly document this limitation could lead to incorrect conclusions about data spoliation.
This scenario illustrates why attorneys must understand BFU vs AFU and ensure that forensic reports clearly document encryption states and their impact on data accessibility.
Conclusion
BFU vs AFU determines what evidence exists in practice, not just in theory. For attorneys, understanding these states improves evaluation of forensic reports, strengthens cross-examination, prevents overreliance on incomplete data, and clarifies what conclusions are truly supported.
In mobile forensics, how a phone is accessed often matters more than what is found. BFU versus AFU is the line that separates assumption from defensible analysis. Attorneys who understand this distinction are better equipped to evaluate evidence, challenge expert testimony, and advocate effectively for their clients.
When reviewing mobile device evidence, always ask about encryption states. Verify that forensic reports document BFU vs AFU conditions. Question experts about partial AFU scenarios and data limitations. These technical details are not mere formalities; they are fundamental to understanding what evidence actually exists and what conclusions can be reliably drawn.
If you are handling a case involving mobile device evidence, consider consulting with the digital forensics experts at Lucid Truth Technologies. We can help you understand encryption states, evaluate forensic reports, and ensure that BFU vs AFU conditions are properly documented and explained in your case. Understanding these technical details can make the difference between winning and losing a case that hinges on mobile device evidence. Contact us to discuss how we can assist with your mobile device forensics needs.
References
[1] National Institute of Standards and Technology, "Guidelines for Mobile Device Forensics," NIST Special Publication 800-101 Revision 1, 2014. [Online]. Available: https://www.nist.gov/publications/guidelines-mobile-device-forensics
[2] Apple Inc., "Data Protection and Encryption," Apple Platform Security, 2024. [Online]. Available: https://support.apple.com/guide/security/data-protection-and-encryption-secdbb118e9c/web
[3] Apple Inc., "Encryption and Data Protection," Apple Platform Security, 2024. [Online]. Available: https://support.apple.com/guide/security/data-protection-and-encryption-secdbb118e9c/web
[4] Google LLC, "File-Based Encryption," Android Open Source Project, 2024. [Online]. Available: https://source.android.com/docs/security/features/encryption/file-based
[5] Google LLC, "Work Profile," Android Open Source Project, 2024. [Online]. Available: https://source.android.com/docs/core/config/work-profile


