Tapped & Traced: Mobile Forensics
Across
- 2. Method of physically removing a memory chip for data acquisition.
- 4. Obtaining data from a user's remote internet-based account.
- 7. Market-leading hardware device for mobile phone data extraction.
- 10. Unique numerical label assigned to a device on a network.
- 12. Popular forensic tool that combines acquisition and analysis.
- 16. Slang term for a large smartphone.
- 18. The device's primary embedded memory for data and OS.
- 19. Number of seconds since January 1 1970 UTC.
- 21. Data acquisition performed while the device is powered on.
- 24. Using a mobile network outside of one's home service area.
- 27. Cheap disposable phone used for illicit or temporary communication.
- 29. Digital key used to maintain a logged-in state without a password.
- 32. The process of restoring unallocated but still-present information.
- 34. Numeric or alphanumeric combination required to unlock a device.
- 36. Data about data, such as creation date or file size.
- 38. Acquisition of all user-accessible files folders and system directories.
- 40. Apple's proprietary messaging service often encrypted.
- 42. Telephony metadata often obtained from the carrier.
- 43. Past records of a phone connecting to towers, from the carrier.
- 46. Judicial authorization for law enforcement to search a device.
- 47. Using signal strength from three or more towers to approximate a device's position.
- 49. Integrated programmable version of the Subscriber Identity Module.
- 50. The device's internal time source crucial for forensic analysis.
- 51. The delay before a transfer of data begins following an instruction.
- 52. Documented history tracking evidence handling and location.
- 53. Feature allowing apps to use the device's geographical position.
Down
- 1. Fast acquisition method using the device's operating system interface.
- 3. The intentional or negligent destruction of evidence.
- 5. Dedicated isolated security coprocessor in modern devices.
- 6. Processor that handles all cellular communication.
- 8. Long-standing forensic software, often used for computer and mobile analysis.
- 9. Chip that authenticates the user to the mobile network.
- 11. A piece of data or residue left by user activity or a system process.
- 13. Tags attached to photos detailing camera settings and sometimes GPS.
- 14. Apple's suite of cloud services.
- 15. An error where a non-event is mistakenly identified as an event.
- 17. Records of all devices that connected to a specific cell antenna in a given period.
- 20. Suite for data analysis, known for cloud and app support.
- 22. Legal order for all devices in a specific area during a set time.
- 23. Unallocated or hidden files that remain on a device.
- 25. Records of the moment an event occurred.
- 26. Forensic term for a complete bit-for-bit copy of storage.
- 28. Bit-for-bit acquisition of the entire device memory.
- 30. To call or text someone repeatedly.
- 31. Controversial tool specializing in unlocking modern iOS devices.
- 33. Simple, non-smart mobile device, often with a physical keypad.
- 35. Record of websites visited by the device's user.
- 37. Secure container on iOS/macOS for storing passwords and account tokens.
- 39. Confirmation or support of a piece of evidence by another source.
- 41. Security measure that protects all user and system data on the device.
- 44. Cryptographic fingerprint used to prove data integrity.
- 45. Apple's facial recognition system.
- 46. Modern pocket computer with an operating system.
- 48. 15-digit number unique to a mobile handset.