FINDINGS OF FORENSIC ARTIFACTS FROM APPLE SMARTWATCH: IMPLICATIONS FOR DIGITAL EVIDENCE

FINDINGS OF FORENSIC ARTIFACTS FROM APPLE SMARTWATCH: IMPLICATIONS FOR DIGITAL EVIDENCE

 

Sonali Kumari 1, Sakshi Sharma 2

 

1 DFIR Analyst, eSec Forte Technologies Pvt. Ltd., Gurgaon, Haryana, Postal Code-122008, India

2 Senior Forensic Analyst, eSec Forte Technologies Pvt. Ltd, Gurgaon, Haryana, Postal Code-122008, India

 

A picture containing logo

Description automatically generated

ABSTRACT

In the relentless pursuit of truth, the smartwatch has emerged as an unexpected, yet powerful, witness.

Smartwatches and other wearable technology are becoming essential sources of evidence data in the rapidly developing field of digital forensics. This study presents a case-based forensic analysis of a Apple Watch, wherein data extraction was performed using Smartwatch Forensic Software and tool. The tool facilitated the retrieval of extensive personal information and system- level information. The extracted data encompassed a wide array of digital artifacts which can serve as critical indicators in criminal investigations involving alibi verification or timeline reconstruction. A correlation-driven approach was also employed to examine relationships between various data types, enhancing their potential to validate or contradict user statements. These findings affirm that smartwatch data, when methodically extracted and analyzed, can provide rich investigative leads and significantly contribute to modern digital evidence workflows.

 

Received 18 October 2025

Accepted 21 November 2025

Published 27 December 2025

Corresponding Author

Sakshi Sharma, sharma02sakshi14@gmail.com 

DOI 10.29121/DigiSecForensics.v2.i2.2025.73  

Funding: This research received no specific grant from any funding agency in the public, commercial, or not-for-profit sectors.

Copyright: © 2025 The Author(s). This work is licensed under a Creative Commons Attribution 4.0 International License.

With the license CC-BY, authors retain the copyright, allowing anyone to download, reuse, re-print, modify, distribute, and/or copy their contribution. The work must be properly attributed to its author.

 

Keywords: Smartwatch Forensic, Apple Watch, IOT Forensics, Wearable Devices

 

Highlights

1)     Smartwatches are vital sources of digital forensic evidence.

2)     A case study on an Apple Watch used a dedicated forensic tool for data extraction.

3)     Extracted user and system data aided in alibi verification and timeline analysis.

4)     Correlation between data types enhanced evidence reliability.

5)     Systematic smartwatch analysis provides valuable leads in investigations

 

 


1. INTRODUCTION

Digital forensics is a broad investigative discipline that includes specialized domains such as cloud forensics, mobile device forensics, network forensics, and computer forensics and Internet of Things (IOT) forensics, each targeting distinct digital evidence sources and environments. Smart IoT refers to IOT devices that incorporate AI. Wearable technology can be used to operate smart IOT devices. Wearable technology, like smartwatches and smart bands, uses sensors to gather personal data to provide consumers with a variety of services. Kim et al. (2023) Smartwatches may be used as digital evidence repositories since they store a significant amount of personal data. Ignoring their possible involvement in criminal activity, smartwatches are only used as digital evidence storage devices Jeon et al. (2023). Each subdomain requires specific investigative processes and tools, and the field is characterized by diverse data sources and overlapping acquisition methodologies. Al-Dhaqm et al. (2021), Brown (2022).

In recent years, wearable devices- particulary smartwatches-have become integral to daily life, offering continuous monitoring of health, activity, and location through embedded sensors such as accelerometers, gyroscopes, barometer, and GPS modules Rey et al. (2022), Kheirkhahan et al. (2019), Bouillet and Grandclément (2024). These compact yet powerful devices gather extensive personal data, making them not just fitness tools but potential digital evidence carriers in forensic investigations. The significance of this data becomes apparent when extracted using specialized forensic tools which allow investigators to retrieve structured information such as health metrics, sleep patterns, physical activity, and communication logs Fozoonmayeh et al. (2020), Odom et al. (2019). This kind of evidence can be instrumental in criminal cases, especially for validating alibis, reconstructing timelines, or identifying behavioral inconsistencies. Despite analysis of extracted smartwatch data can provide critical insights into an individual's health status, daily routines, and even psychological behavior. By accessing and analyzing this raw sensor data, practitioners can develop advanced applications for real-time assessment, mobility tracking, and forensic analysis. These capabilities make smartwatches a potent source of digital evidence, particularly as they sometimes store more data than the user’s mobile phone Van et al. (2023), Kheirkhahan et al. (2019). However, extracting and handling this data introduces challenges regarding privacy and security. Smart watches have the potential to improve health in daily life by allowing self-monitoring of personal activity, offering feedback based on activity measures, enabling in-situ surveys to identify behavioural patterns, and facilitating bidirectional communication with family members and healthcare providers. However, since smart watches are a relatively new technology, research on them is still in their early stages. Reeder and David (2016)

 

2. Overview of Smartwatch Forensics

Smartwatch Forensics is the branch of forensic science which mainly deals with the study of smartwatch evidence with respect to solving any criminal investigation. This field is an ongrowing field which impacts their importance day by day in human life. Smartwatches contain sensitive data and encrypting their backups is crucial to protect personal information Smartwatches contain personal data such as contacts, text messages, calendar information, emails, photos, and wallet details, all of which can serve as important evidence for forensic investigators. Al-Sharrah et al. (2018). It can offer a wide range of digital evidence directly from their internal storage, such as emails, contacts, events, notifications, health and fitness information, and communications Baggili et al. (2015).

 

3. Methodology

3.1. SWDGE Guidelines for iOT Devices Extraction:

The Scientific Working Group on Digital Evidence (SWGDE) outlines a systematic process for handling IOT and digital evidence, including smartwatches for forensic examination. As depicted in their guidelines, the process begins with identification and collection, followed by preservation, analysis, and finally reporting for legal proceedings.

Figure 1

Figure 1 Steps of Investigation of Digital Evidence Provided by SWDGE

 

3.2. Device AND Setup

Smartwatch Infromation used in the Experiment:

Manufacturer

Product Name

Serial Number

System Version

HW Revision

Apple

Watch SE 44mm

G99*********

10.6.1_Firmware: iBoo t-1015 1.140.19_Build:21U580

N140bAP, Model:MYDT2

 

4. Tools

4.1. MOBILedit Forensic Version 9.1.0.25120

Forensic analysis of smartwatch data primarily relies on specialized tools like Mobile edit, with its effectiveness varying based on the smartwatch model and the chosen extraction technique. In our study we do extraction with the help of Mobile edit Forensic Version 9.1.0.25120. This mobile forensic tool was chosen because forensic analysts frequently utilize it to conduct their forensic investigations. Additionally, Because of its superiority in recovering a variety of data from mobile devices, including deleted data, the MOBILedit program was selected. Because of this feature, investigators can retrieve vital evidence from smartphones and tablets that might not otherwise be available. In cybersecurity situations, legal litigation, and criminal investigations, its value is immeasurable Akintola (2025). MOBILedit Forensic Express effectively extracts 0.75% of evidence from Android smartphones in body shaming cases Safitri et al. (2023) Mobile edit Forensic Pro (with the Smartwatch Kit) was used for data extraction. This tool supports Apple Watch Series 0–5 and SE (1st/2nd gen) via a specialized micro-USB adapter Compelson Labs (2025). For Series 5, we used the Series 4/5 adapter cable.

 

4.2. MOBILedit Smartwatch kit

Mobile edit Smartwatch toolkit was used in the evidence samples of this research to extract data from various smartwatch models, including Apple Watch (Series 0 to Series 6), Samsung, and Garmin devices. The use of dedicated readers and diagnostic connectors facilitated structured data acquisition and supported forensic analysis throughout the study.

 

5. Analysis

5.1. Examination of Apple Smartwatch Evidence with MOBILedit Forensic

This research involves analyzing data from the Apple Smartwatch using MOBILedit Forensic and the Smartwatch Kit tools. We connected the Apple watch physically to the forensic Workstation using the specialized diagonstic reader provided in the MOBILedit Smartwatch Kit. In reader having, different Generational Series Ports. These ports correspond to various device series and sizes, including S1/S2/S3 (38mm), S2/S3 (42mm), S4/S5/SE (40mm), and S4/S5/S6/SE (44mm). The target Apple Watch is connected to the port that matches its specific model and size to ensure accurate and secure physical linkage for successful data acquisition. For extraction of data we install the iTunes Backup Service in forensic Workstation, it is necessary component to establish communication with Apple Devices, as apple watch accesss relies on Apple’s backup protocols for logical extraction. This utility was downloaded and installed on the system to enable the process. For connecting Apple Watch is physically connected to the MOBILedit Smartwatch Reader through the diagnostic Port located beneath the watch strap connector. This adapter was then connected via USB to a forensic Workstation configured with the MOBIledit Forensic Software. The tool prompted the connection and identification of the smartwatch and here iTunes Backup Service established communication with Apple Watch and provide access relies on Apple’s backup protocols for logical extraction. After getting access, the software interface displayed a preview of the connected Apple watch with a option having browse content which contain model, OS and other information of the smartwatch. Once the device was successfully recognized, we proceed with Next Option by clicking on it.

 Figure 2

 

Figure 2 Apple Watch SE 44mm Connected to Mobile edit Software

 

The software provides us two options : Logical Extraction & Camera and Screen Capture. We click on the Logical Extraction method, which is the good approach for modern apple watches. In the extraction configuration step, the option “ Full Content ” we selected to ensure comprehensive acquisition across all supported artifact categories.

Figure 3

Figure 3 Full Content Logical Extraction by Mobile edit Software

 

At the end we prepare a report of all data, wherein the software provides the desired output format (PDF/HTML/MOBILedit Backup etc.) and entered relevant investigator and case details as required by forensic reporting standards. Finally, the extraction process completed successfully, and a structured forensic report was generated containing all accessible data categories retrieved from the Apple Watch. This included user-level, system-level, and application-specific data, now available for analysis within the digital forensic workflow.

Figure 4

Figure 4 Logical Extraction of Apple Smartwatch: Running Process

 

5.2. Findings and Results

The forensic Examination of the Apple watch SE using MOBIledit Forensic Version 9.1 provides extensive data and useful artifacts. In Report we found important information regarding the apple watch. Figure 5 shows the recovered Smartwatch details which includes, Smartwatch manufacturer details (Apple), model and hardware revision (N140bAP, MYDT2), and Software Version (10.6.1). System identifiers such as device name (*******Apple Watch) serial number (********Q07Y).

 Figure 5

Figure 5 Recovered Smartwatch Details

 

Figure 6

Figure 6 Packages Detail Found on Report

 

Figure 7

Figure 7 Device Properties found on Apple Smartwatch

 

Figure 6, Package log table was extracted during the Apple smartwatch data acquisition process, listing multiple system-related modules. These include components such as App Downgrade, Bluetooth, Cell Towers, Malware Detection, and iOS Screenshot Support, each tagged with a timestamp indicating last activity or update. This metadata is valuable in forensic analysis as it helps in determining user behavior, system changes, and potential anomalies. Figure 7, shows the device properties of Apple Smartwatch including Wi-Fi MAC address, Bluetooth and Ethernet addresses, were also accessible, suggesting the device's ability to interface across multiple networks and communication environments. The report shows the absence of a SIM card, confirming the device was not cellular enabled. Time-specific parameters such as device time and time zone (Asia/Kolkata) were also recorded, essential for temporal mapping of activities. Storage metrics revealed a total capacity of 29.8 GB, of which 10.2 GB was in use.

Figure 8

Figure 8 Artifacts Evidence Recovered

 

In terms of user content Figure 8 shows, the device contained 92 installed applications, 43 photos, 688 image files, 115 audio files, 5351 internal files, 287 application-specific files, and 9 miscellaneous extra files. Location-related data included 49 distinct GPS coordinates and one geolocation configuration store, underscoring the device’s mobility tracking capabilities. Table 1, shows the 92 applications list which we found on the smartwatch during analysis.

Table 1

Table 1 92 Applications List Evidence found on Extracted Apple Smartwatch Data

Accessibility UI Server

Activity

Alarms

App Store

Apple Store

AppStoreTrampoline

Audiobooks

BluetoothUIService

Calculator

Calendar

Calendar

Camera Remote

Carousel

Check In

ClockFace

CompanionServicesAlert

Compass

Contacts

Control Nearby Devices

CSViewService

CTKUIService

Cycle Tracking

DataMigrationMonitor

Diagnostics

DiagnosticsService

Find Devices

Find Items

Find People

FitnessNotifications

Flightradar24

Forest

Google Maps

Handwashing

Heart Rate

Home

iCloud

Keynote

Mail

Mail

Maps

Medications

Memoji

Messages

Mindfulness

MTLReplayer

Music

NanoCompassAlertUI

NanoDemo

NanoMessageUIViewService

NanoNowPlayingViewService

NanoSettingsViewService

NanoSharing

NanoTextSizeViewService

News

Nike Training

Noise

Now Exercising

Now Playing

OneNote

Outlook

Phone

Photos

Podcasts

PreBoard

QuickboardViewService

ReBoard

Reminders

Remote

Renpho Health

Safari

SessionAlertUI

Settings

Setup

Shortcuts

ShortcutsActions

Sleep

Stocks

Stopwatch

StoreKitUIService

Timers

Tips

Voice Memos

VoiceOverTouch

Walkie-Talkie

Wallet

Weather

Wi-Fi

WidgetRenderer_Default

Windy

Workout

World Clock

Zoom

 

6. Co-relation Analysis of Photos & GPS Location Data

Figure 9 shows the photos recovered from Apple Smartwatch by analyzing the image metadata, such as File Name, path , size and when image is created, modified and accessed Some important information which includes Date of Generation & Digitization and information of Time when picture was Clicked from Phone (2023-07-15 18:41:55 (UTC +5:30). During analysis of Photos and GPS Location evidence, extracted metadata of apple smartwatch revealed the critical metadata within the image files, included the Position (Google Maps or GPS coordinates) (Latitude: 27.06737°, Longitude: 75.88012°), along with the date and time of image captured. By clicking on Google Maps , these coordinates correspond to a physical location and by mapping the data which is extracted from GPS Data onto Google Maps, the exact geographical position from where image was captured is identified in Figure 10, shows the visual characteristics of the site in Google Street view were consistent with the content found in the image, which confirmed the correlation between the Image evidence and actual location from where picture clicked. It helps us to do the cross-verification of Image evidence found on Smartwatch. It also demonstrates that such data can pinpoint the origin of photographs and strengthens the evidential weight of location -based digital artifacts in forensic investigations, supporting accurate reconstruction of events and user activity through GPS Data.

Figure 9

Figure 9 Photos & GPS Location Evidence Data Founds on Extracted Apple Smartwatch

 

Figure 10

 

Figure 10 Position from Google Maps showing from where Picture is Being Captured

 

Figure 11

Figure 11 Audio Files Evidence Found in Apple Watch Report

 

Figure 12

 

Figure 12 Internal Files Recovered from Smartwatch

 

Furthermore, in Figure 11, represents the Audio Files found in the Report of Smartwatch which also have Path information, by clicking on it we can also download the Audio file. It also gives us information of Size of Audio File, Created, Modified, Accessed and Duration of the audio. This evidence also strengthens the credibility and admissibility of smartwatch derived data in Forensic investigations. Figure 12, Represents the internal files which is found during extraction also contains the size of the file.

 

7. Discussion

Data collected from Apple Smartwatches has been extracted, examined, and analyzed. especially with forensic tools like MOBILedit, which are quite efficient. We provide a concise overview of every data type found throughout the extraction process in table 3. We also get the most data from the Apple Watch's logical extraction. Photo evidence with GPS included to prove the accuracy of the data, metadata and time-stamped audio proof were readily taken out of the report and examined. Using Google Maps and Street View, the image-GPS data correlation was successfully confirmed. This data gives investigators an understanding of where the photo was taken or confirms the user's location and actions. Audio Evidence indirectly helps us to synchronize temporal metadata with other data sources and beneficial for event reconstruction Safitri et al. (2023). These findings also reinforce the border applicability of Smartwatch Forensic in real-world casework like missing person, location-based alibi verification. The ability to extract and validate data from wearable devices contributes not only to factual accuracy but also the evidentiary admissibility under legal standards.

 

7.1. Significance of Data found on Apple Smartwatch Forensic Examination

In Table 2, extracted data from the Apple Watch SE 44mm provides crucial forensic insights and key identifiers such as device model, serial number, and hardware/software revisions confirm the device’s authenticity and integrity. Storage details, application count, and media files offer a snapshot of user activity. Network addresses (Wi-Fi, Bluetooth, Ethernet) and GPS data help investigator to trace connectivity and physical movements. The absence of jailbreaking ensures the data's reliability, while timestamps and timezone settings support accurate event timeline reconstruction. Overall, this metadata is vital for user profiling, activity analysis, and digital evidence correlation in forensic investigations.

 Table 2

Table 2 Data Found on Apple Smartwatch During Examination

S.NO.

DATA TYPE

INFORMATION FOUND

1

Manufucturer Details

Apple

2

Product

Watch SE 44mm

3

HW Revision

N140bAP, Model:MYDT2

4

Platform

Apple

5

SW Revision

10.6.1_Firmware:iBoot-1015 1.140.19_Build:21U580

6

Device Name

*******Apple Watch

7

Jailbroken

NO

8

Serial Number

G99***********

9

SIM Card

NO

10

SW Revision Extended

10.6.1_Firmware:iBoot-10151.140.19_Build:21U580

11

Device Unique Id

00008006-0014D2300A63402E

12

Device Time

29-04-2025

11:26:03 (UTC+5:30)

13

Time Zone

Asia/Kolkata

14

Wifi MAC Address

E8:1C:D8:B0:DC:9E

15

Bluetooth Address

E8:1C:D8:AE:C5:6F

16

Ethernet Address

E8:1C:D8:A8:C9:0F

17

Communication Type

Apple

18

Device Type

Watch

19

Total Storage

29.8GB

20

Used Storage

10.2GB

21

Applications

92

22

Photos

43

23

Image Files

688

24

Audio Files

115

25

Internal Files

5351

26

Application Files

287

27

Extra Files

9

28

GPS Location

49

29

Geolocation Config Store

1

 

8. Conclusion

Smartwatches have become integral to our daily lives, meticulously recording personal, health, and sleep data. This research aimed to forensically examine the logical extraction of data from an Apple Watch using a specialized tool. Our goal was to demonstrate the utility of smartwatch evidence in criminal investigations by revealing the depth of personal information these devices can provide. Our findings indicate that MOBILedit Forensic Tool is highly effective, offering accurate data extraction and facilitating critical correlation analyses, such as linking GPS locations to specific image evidence. We successfully recovered a wide array of data, including media files, application lists, GPS locations, internal files, audio files, and comprehensive device information like Wi-Fi and Bluetooth MAC addresses. This study provides valuable insights for investigators seeking to extract crucial data from smartwatches.

 

Author Contribution

Sonali Kumari designed the research framework Finding Forensic Artifacts on Smartwatches, developed the analytical models, and prepared the initial draft of the manuscript. Vaibhav Sakhare contributed to data acquisition, interpretation, and assisted in refining different sections of the paper. Both authors reviewed and approved the final manuscript for submission. The other contributors supported the review and provided critical feedback to enhance the quality of the work.

 

Abbreviations

GPS: Global Positioning System MAC: Media Access Control SW: Software

UTC: Coordinated Universal Time HW: Hardware

IoT: Internet of Things AI: Artificial Intelligence

SWDGE: Smart Wearable Device and Gadget Ecosystem

USB: Universal Serial Bus

OS: Operating System

iOS: iPhone Operating System SIM: Subscriber Identity Module

 

CONFLICT OF INTERESTS

None. 

 

ACKNOWLEDGMENTS

None.

 

REFERENCES

Akintola, G. B. (2025). Evaluating the Security Vulnerabilities of Selected Mobile Forensic Applications. International Journal of Scientific Research in Multidisciplinary Studies, 11(2).  

Al-Dhaqm, A., & others. (2021). Digital Forensics Subdomains: The State of the Art and Future Directions. IEEE Access, 9, 152476–152502. https://doi.org/10.1109/ACCESS.2021.3124262   

Al-Sharrah, M., Salman, A., & Ahmad, I. (2018, March). Watch Your Smartwatch. In 2018 International Conference on Computing Sciences and Engineering (ICCSE) (pp. 1–5). IEEE. https://doi.org/10.1109/ICCSE1.2018.8374228   

Baggili, I., Oduro, J., Anthony, K., Breitinger, F., & McGee, G. (2015, August). Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. In 2015 10th International Conference on Availability, Reliability and Security (pp. 303–311). IEEE. https://doi.org/10.1109/ARES.2015.39   

Bouillet, J., & Grandclément, C. (2024). Sufficiency, Consumption Patterns and Limits: A Survey of French Households. Buildings and Cities, 5(1), 675–691. https://doi.org/10.5334/bc.454   

Brown, E. K. (2022). Digital Forensic and Distributed Evidence. Research Nexus IT, Law, Cyber Security & Forensics, 1(1), 357–362. https://doi.org/10.22624/AIMS/CRP-BK3-P57   

Compelson Labs. (2025). Introduction to MOBILedit Forensic. In MOBILedit Forensic User Guide.   

Fozoonmayeh, D., Le, H. V., Wittfoth, E., & others. (2020). A Scalable Smartwatch-Based Medication Intake Detection System Using Distributed Machine Learning. Journal of Medical Systems, 44(76). https://doi.org/10.1007/s10916-019-1518-8   

Jeon, S., Chung, J., & Jeong, D. (2023). Watch Out! Smartwatches as Criminal Tool and Digital Forensic Investigations. Arxiv Preprint arXiv:2308.09092.  

Kheirkhahan, M., Nair, S., Davoudi, A., Rashidi, P., Wanigatunga, A. A., Corbett, D. B., Mendoza, T., Manini, T. M., & Ranka, S. (2019). A Smartwatch-Based Framework for Real-Time and Online Assessment and Mobility Monitoring. Journal of Biomedical Informatics, 89, 29–40. https://doi.org/10.1016/j.jbi.2018.11.003   

Kim, M., Shin, Y., Jo, W., & others. (2023). Digital Forensic Analysis of Intelligent and Smart IOT Devices. Journal of Supercomputing, 79(2), 973–997. https://doi.org/10.1007/s11227-022-04639-5    

Odom, N. R., Lindmar, J. M., Hirt, J., & Brunty, J. (2019). Forensic Inspection of Sensitive User Data and Artifacts from Smartwatch Wearable Devices. Journal of Forensic Sciences, 64(6), 1673–1686. https://doi.org/10.1111/1556-4029.14109   

Reeder, B., & David, A. (2016). Health at Hand: A Systematic Review of Smartwatch Uses for Health and Wellness. Journal of Biomedical Informatics, 63, 269–276. https://doi.org/10.1016/j.jbi.2016.09.001   

Rey, B., Lee, B., Choe, E. K., & Irani, P. (2022). Investigating in-Situ Personal Health Data Queries on Smartwatches. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies, 6(4), Article 179, 19 pages. https://doi.org/10.1145/3569481   

Safitri, Y., Riadi, I., & Sunardi, S. (2023). Mobile Forensic for Body Shaming Investigation Using Association of Chief Police Officers Framework. MATRIK: Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, 22(3), 651–664. https://doi.org/10.30812/matrik.v22i3.2987   

Van Dijk, R. M. K., Gawehns, D., & van Leeuwen, M. (2023). WEARDA: Recording Wearable Sensor Data for Human Activity Monitoring. Journal of Open Research Software, 11(1), 13. https://doi.org/10.5334/jors.454   

     

 

 

 

 

 

 

Creative Commons Licence This work is licensed under a: Creative Commons Attribution 4.0 International License

© DigiSecForensics 2025. All Rights Reserved.