A modern Indian smartphone carries three distinct storage tiers from the examiner's view. The SIM is the smallest and most regulated; the internal user-data partition is the densest; the external SD card (where present) is the most variable. Each tier needs a different acquisition path and yields a different evidence class.
The SIM card carries an ICCID (Integrated Circuit Card Identifier, 19 to 20 digits printed on the SIM and burned into ICCID file 0x2FE2), an IMSI (the subscriber identity used at the cellular layer), and a small EF (Elementary File) tree with operator-defined data. Practical evidence on a SIM is limited and shrinking: the SMS storage area (EF_SMS) holds the last few messages the OS chose to store on the SIM rather than in the OS database, the ADN (Abbreviated Dialling Numbers) phonebook holds contacts the user explicitly saved to the SIM, the LND (Last Numbers Dialled) file holds recent dialled numbers, and the LOCI file holds the last cell ID the SIM registered with. Most modern Android and iOS handsets store contacts and SMS in OS databases rather than on the SIM, so the SIM yield is small. The SIM is read with a smart card reader (a basic PC/SC reader plus pyscard, or the Cellebrite UFED SIM extractor) and the data is dumped through the operator's STK (SIM Toolkit) interface.
Internal memory is the volume case for forensics. The user-data partition holds the app sandboxes (each app's /data/data/<package>/databases/ and /data/data/<package>/files/ on Android, the equivalent in the container path on iOS), the Photos and Videos camera roll, the Downloads folder, the system logs (/data/system/, /data/log/, dropbox logs on Android), the call log database, the SMS database, the location-history databases (Google Location History cache, Apple Significant Locations), the Wi-Fi network history, the Bluetooth pairing history, and the deleted-but-not-yet-overwritten regions that file system extractions and physical extractions reach. The relative density per app is the working examiner's mental model: WhatsApp's msgstore.db plus the media cache typically yields the highest-volume content per case; Google Maps Timeline yields the highest-fidelity location data; Truecaller and the dialler database yield the most reliable contact resolution.
External memory is where the user stored what the OS would not. SD cards still carry photos, videos, app caches, WhatsApp media (when the user moved it off internal storage), encrypted backups and occasional deliberate evidence hiding (steganographic image hosts, encrypted containers). The SD card is removed and imaged separately with a write-blocker (USB write-blocker for forensics, or a Linux on a mounted device) using or for the bit-for-bit copy, then carved with or for deleted content. Carving recovers JPEG, MP4, PDF and similar files even when the file system metadata is gone, because the format-specific headers and footers are recognisable in raw blocks. The full carving workflow lives at .