Details of the Federal Bureau of Investigation’s digital forensics methods surfaced during a recent US court case. Investigators managed to extract incoming message content from a defendant’s phone, even though the Signal app had been uninstalled and the chats were set to auto-delete.
Bypassing this security wasn’t made possible by a flaw in the messaging app itself, but rather a specific quirk in Apple’s operating system. If an iPhone user allows message previews on the lock screen, iOS automatically and invisibly saves these notifications in the device’s internal storage. With physical access to the smartphone, agents used specialized forensic software to extract this cached notification log.
According to court documents and trial observers, this method has one key technical limitation: it only allows for the recovery of incoming messages, as the notification system does not archive texts sent by the device owner.
The trial featuring this evidence involved a group accused of vandalism and setting off fireworks around the ICE Prairieland Detention Facility in Alvarado, Texas, in July, as well as shooting a police officer in the neck. This also marked the first instance of charges being filed for alleged activity tied to the “Antifa” movement after Donald Trump designated the loosely organized network a terrorist organization.
The caching mechanism is a core iOS system feature and most likely captures previews from various other messaging apps and platforms transmitting sensitive data.
How can users protect such confidential messages from being read?
The simplest defense against conversations being stored in the phone’s memory is to change the settings directly within the Signal app’s notification section and select the “No Name or Content” option. In this scenario, the system will only log the fact that a notification was received, leaving its memory completely blank regarding the sender’s details and the message content itself.

