Tapped & Traced: Mobile Forensics

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253
Across
  1. 2. Method of physically removing a memory chip for data acquisition.
  2. 4. Obtaining data from a user's remote internet-based account.
  3. 7. Market-leading hardware device for mobile phone data extraction.
  4. 10. Unique numerical label assigned to a device on a network.
  5. 12. Popular forensic tool that combines acquisition and analysis.
  6. 16. Slang term for a large smartphone.
  7. 18. The device's primary embedded memory for data and OS.
  8. 19. Number of seconds since January 1 1970 UTC.
  9. 21. Data acquisition performed while the device is powered on.
  10. 24. Using a mobile network outside of one's home service area.
  11. 27. Cheap disposable phone used for illicit or temporary communication.
  12. 29. Digital key used to maintain a logged-in state without a password.
  13. 32. The process of restoring unallocated but still-present information.
  14. 34. Numeric or alphanumeric combination required to unlock a device.
  15. 36. Data about data, such as creation date or file size.
  16. 38. Acquisition of all user-accessible files folders and system directories.
  17. 40. Apple's proprietary messaging service often encrypted.
  18. 42. Telephony metadata often obtained from the carrier.
  19. 43. Past records of a phone connecting to towers, from the carrier.
  20. 46. Judicial authorization for law enforcement to search a device.
  21. 47. Using signal strength from three or more towers to approximate a device's position.
  22. 49. Integrated programmable version of the Subscriber Identity Module.
  23. 50. The device's internal time source crucial for forensic analysis.
  24. 51. The delay before a transfer of data begins following an instruction.
  25. 52. Documented history tracking evidence handling and location.
  26. 53. Feature allowing apps to use the device's geographical position.
Down
  1. 1. Fast acquisition method using the device's operating system interface.
  2. 3. The intentional or negligent destruction of evidence.
  3. 5. Dedicated isolated security coprocessor in modern devices.
  4. 6. Processor that handles all cellular communication.
  5. 8. Long-standing forensic software, often used for computer and mobile analysis.
  6. 9. Chip that authenticates the user to the mobile network.
  7. 11. A piece of data or residue left by user activity or a system process.
  8. 13. Tags attached to photos detailing camera settings and sometimes GPS.
  9. 14. Apple's suite of cloud services.
  10. 15. An error where a non-event is mistakenly identified as an event.
  11. 17. Records of all devices that connected to a specific cell antenna in a given period.
  12. 20. Suite for data analysis, known for cloud and app support.
  13. 22. Legal order for all devices in a specific area during a set time.
  14. 23. Unallocated or hidden files that remain on a device.
  15. 25. Records of the moment an event occurred.
  16. 26. Forensic term for a complete bit-for-bit copy of storage.
  17. 28. Bit-for-bit acquisition of the entire device memory.
  18. 30. To call or text someone repeatedly.
  19. 31. Controversial tool specializing in unlocking modern iOS devices.
  20. 33. Simple, non-smart mobile device, often with a physical keypad.
  21. 35. Record of websites visited by the device's user.
  22. 37. Secure container on iOS/macOS for storing passwords and account tokens.
  23. 39. Confirmation or support of a piece of evidence by another source.
  24. 41. Security measure that protects all user and system data on the device.
  25. 44. Cryptographic fingerprint used to prove data integrity.
  26. 45. Apple's facial recognition system.
  27. 46. Modern pocket computer with an operating system.
  28. 48. 15-digit number unique to a mobile handset.