Skip to content
Search
  • HOME
  • about
  • Services
  • Blog
  • HOME
  • about
  • Services
  • Blog
CONTACT US

Can you prove a text message was not sent from a particular phone?

A client recently asked me to analyze a mobile phone forensically to prove that a specific text message was not sent from the phone. This message is the focal point of a very public civil lawsuit.

I explained that what I could do is examine the phone and see if I could find traces of the message on the phone, yet there were various factors that could explain why a message that was once on a phone may not be able to be recovered forensically. Without having yet imaged the phone, it was unclear if a full file system extraction (FFS) could be made of the device or if we would have to settle for a logical image.

A FFS extraction is considered the best as it includes the most complete set of files and databases. In contrast, a logical extraction of the phone might only include messages that have not been deleted[1]. Of course, this all depends on the age of the phone hardware and the version of Android or iOS running on the phone.

Even with a FFS extraction, I was concerned that the SQLite database that contains the message could have been "vacuumed" of any deleted data. When records in an SQLite database are deleted, at first, they are simply marked as deleted but the vacuum (or auto vacuum) process rebuilds and compacts the database without the deleted data [2, 3]. I explained there was no way to tell without performing the examination, and we need to be careful to remember that absence of evidence is not evidence of absence [4]. I said that even if I did not find the message on the phone, I would not be able to state with absolute certainty that the message was never on the phone--just that there was no evidence found that it was on the phone.

Thinking about the problem differently, I suggested requesting the Call Detail Records [5] from the phone carrier. This information would allow us to focus on the interactions between the parties in the lawsuit. After all, one possible explanation was that the message was spoofed [6]. Proving that the message originated from a location other than the phone can be an effective alternate strategy. I have supported multiple cases where a third party used short messaging service (SMS) spoofing to inflame a volatile personality to retaliate against an unwitting victim.

If you need the clear truth about a case involving mobile forensics or caller ID spoofing, contact us at Lucid Truth Technologies. We are here to help you.


[1] https://blog.specialcounsel.com/ediscovery/three-types-of-mobile-device-extractions-and-what-each-contains/

[2] https://www.sqlitetutorial.net/sqlite-vacuum/

[3] https://belkasoft.com/sqlite-forensics-with-belkasoft-x

[4] https://en.wikipedia.org/wiki/Evidence_of_absence

[5] https://www.androidheadlines.com/2021/05/everything-you-wanted-to-know-call-detail-records.html

[6] https://zsecurity.org/sms-spoofing/

MORE POSTS

Digital Evidence and Data Recovery

Digital Evidence Search Rules: Are Current Standards Constitutionally Broken?

Read More »
May 5, 2025
Digital Evidence and Data Recovery

Real-World Impact: Digital Forensics Case Studies and Conclusion

Read More »
April 14, 2025
Digital Forensics Court Expert
Legal Strategy

Leveraging Your Digital Forensics Expert in Court: Maximizing Their Role During Trial

Read More »
March 24, 2025
Load More ...
Digital Evidence and Data Recovery

Digital Evidence Search Rules: Are Current Standards Constitutionally Broken?

Read More »
May 5, 2025
Digital Evidence and Data Recovery

Real-World Impact: Digital Forensics Case Studies and Conclusion

Read More »
April 14, 2025
Load More ...
Digital Evidence and Data Recovery

Digital Evidence Search Rules: Are Current Standards Constitutionally Broken?

Read More »
May 5, 2025
Digital Evidence and Data Recovery

Real-World Impact: Digital Forensics Case Studies and Conclusion

Read More »
April 14, 2025
Load More ...

our services

Background Checks and Open-Source Intelligence Gathering

Mobile Forensics

Cloud Forensics

Computer Forensics

Lucid Truth Technologies is a registered trademark of Kenneth G. Hartman Consulting, LLC
©2025. Lucid Truth Technologies.
Privacy Policy
Scroll to Top

Subscribe