Forensics Exam 4

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/80

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

81 Terms

1
New cards

Cellular Network

Network of short-distance transceivers that allow low-power phones to connect to towers by hopping from one to another.

2
New cards

1G (Analog)

First generation mobile networks using modulated radio signals for voice calls.

3
New cards

2G (Digital)

Introduced handheld form, digital circuit-switched communication, and practical data communication (SMS).

4
New cards

3G (Broadband)

Phones could transfer data at Internet speeds using packet-switching, making them miniature computers.

5
New cards

4G (Native IP)

Accesses the Internet directly using IP protocols and Wi-Fi for faster speeds and more bandwidth.

6
New cards

Mobile Operating System (OS)

Custom-designed program that controls mobile hardware and user interaction, like Android or iOS.

7
New cards

Geolocation in Mobile Forensics

Determining a device's location using GPS data to place a suspect near a crime scene.

8
New cards

Data Extraction from Mobile Devices

Physical extraction (full bit-by-bit copy) and logical extraction (copy of visible user data).

9
New cards

Role of SD Cards in Mobile Devices

Provide nonvolatile memory expansion, where stored data remains even when powered off.

10
New cards

Information Stored on SIM Cards

IMSI number (user ID) and ICCID (SIM card ID) linking the phone to the mobile network.

11
New cards

File System on a Mobile Device

Software that organizes and tracks file names, storage, and access using databases.

12
New cards

Causal and Temporal Chains in Digital Evidence

Causal Chain: cause-effect link of evidence; Temporal Chain: chronological timeline of events.

13
New cards

Cross-Drive Analysis

Technique that ties together evidence from multiple digital devices to physical crime scenes.

14
New cards

Computer Forensics

Preservation, acquisition, extraction, and interpretation of computer data for legal evidence.

15
New cards

Digital Forensics (DFIR)

Digital Forensics (analyzing devices) and Incident Response (responding to cyberattacks).

16
New cards

Difference between Hardware and Software

Hardware: physical components. Software: instructions that tell hardware what to do.

17
New cards

Key Hardware Components Inside a Computer

Case, motherboard, CPU, RAM, ROM, storage drives (HDD/SSD).

18
New cards

RAM

Temporary volatile memory storing active data; lost when the computer powers off.

19
New cards

ROM

Nonvolatile memory storing firmware to start the boot process.

20
New cards

Computer Boot Process

BIOS starts, POST checks components, boot drive is loaded, OS appears on login screen.

21
New cards

Data Storage on Storage Devices

Stored in binary (1s and 0s); requires partitioning and formatting to organize data access.

22
New cards

Tracks, Sectors, Clusters, and Cylinders

Tracks: concentric circles. Sectors: smallest storage unit. Clusters: groups of sectors. Cylinders: aligned tracks vertically.

23
New cards

File Allocation Table (FAT)

System tracking file locations on drives.

24
New cards

Master File Table (MFT)

Used in NTFS file systems to organize files and metadata.

25
New cards

Forensic Image

Bit-for-bit copy of a storage device preserving every piece of data.

26
New cards

Hash Values (MD5/SHA)

Unique fingerprints verifying forensic image integrity matches original data.

27
New cards

Visible and Latent Data

Visible: data the OS sees (e.g., documents). Latent: hidden data like deleted files or slack space.

28
New cards

RAM Slack and File Slack

RAM slack: empty space in a sector after a file ends. File slack: space from end of last sector to end of cluster.

29
New cards

Latent Data Locations

In unallocated space, swap files, and deleted file areas.

30
New cards

Application Data Evidence

Emails, chat logs, videos, financial transactions, web history, usernames.

31
New cards

Investigating Internet Activity

Common places include internet cache, cookies, history files, bookmarks.

32
New cards

IP Address

Numeric address allowing devices to send/receive data across networks.

33
New cards

Questioned Document

Any object with handwriting or print whose authenticity or source is in doubt.

34
New cards

Handwriting Uniqueness

Handwriting becomes unconscious and impossible to exactly replicate between individuals.

35
New cards

Angularity

The characteristic angle of letters in handwriting.

36
New cards

Slope

The angle at which letters are written, indicating the direction of the handwriting.

37
New cards

Speed

The rate at which handwriting is produced.

38
New cards

Pressure

The amount of force applied to the writing instrument during writing.

39
New cards

Letter/word spacing

The distance between individual letters and words in handwriting.

40
New cards

Letter size

The height of the letters in handwriting.

41
New cards

Connections

The way letters are linked together in handwriting.

42
New cards

Pen movement

The motion of the pen during writing.

43
New cards

Skill

The level of proficiency in handwriting.

44
New cards

Dexterity

The physical ability to manipulate the writing instrument.

45
New cards

Margins

The space around the written text on a page.

46
New cards

Crowding

The density of letters and words in a given space.

47
New cards

Insertions

Additional letters or words added into the text.

48
New cards

Alignment

The positioning of text in relation to the margins.

49
New cards

Spelling

The correct arrangement of letters in words.

50
New cards

Punctuation

The use of symbols to clarify meaning in writing.

51
New cards

Phraseology

The choice and arrangement of words in phrases.

52
New cards

Grammar

The set of rules governing the structure of sentences.

53
New cards

Handwriting exemplars

Known writing samples used for comparison with questioned documents.

54
New cards

Transmitting Terminal Identifier (TTI)

Fax machine header helping link documents to a specific device.

55
New cards

Signs of document alterations

Erasures, infrared luminescence revealing hidden text, obliterations (blotting out writing).

56
New cards

Indented writing

Impressions left on sheets underneath written-on pages, revealed using electrostatic detection.

57
New cards

Digital imaging processing in document examination

Scanning and digitally enhancing documents to reveal obscured or altered information.

58
New cards

Ink comparison in forensic document analysis

Using visible light microspectrophotometry or thin-layer chromatography.

59
New cards

Features revealed by paper analysis

Fiber type, fiber length, fiber orientation, thickness, density, color, additives.

60
New cards

Oxidation

Chemical reaction combining oxygen with another substance, producing energy (heat, light).

61
New cards

Combustion

Rapid oxidation accompanied by heat and light (exothermic chain reaction).

62
New cards

Three elements needed to sustain fire

Fuel, oxygen, and heat.

63
New cards

Pyrolysis

Decomposition of solid fuels into gases through heat.

64
New cards

Flammable range

The gas-air mixture concentrations within which combustion can occur (e.g., gasoline: 1.3-6%).

65
New cards

Glowing combustion

Smoldering at fuel-air interface.

66
New cards

Spontaneous combustion

Fire caused without external ignition.

67
New cards

Three methods of heat transfer in fires

Conduction, radiation, convection.

68
New cards

Indicators of arson

Multiple separate fires, use of streamers, irregular burn patterns, severe burns on floors.

69
New cards

Flashover

Simultaneous ignition of all combustibles, making fire behavior abnormal and confusing the point of origin.

70
New cards

Common ignition devices

Matches, cigarettes, firearms, electrical devices, Molotov cocktails.

71
New cards

Flammable residues recovery

Heating sealed debris containers and analyzing vapors using gas chromatography.

72
New cards

Vapor concentration technique

Charcoal strip absorbs vapors from debris container, later analyzed by GC.

73
New cards

Gas Chromatograph (GC)

The most reliable instrument for detecting flammable residues.

74
New cards

Explosion

Rapid oxidation creating sudden gas and pressure buildup.

75
New cards

Low explosives

Black powder, smokeless powder; undergo deflagration (subsonic combustion).

76
New cards

High explosives

Primary explosives (detonators) and secondary explosives (dynamite, TNT, PETN, RDX).

77
New cards

Detonation

Extremely rapid decomposition causing an outward rush of gases (~7,000 mph).

78
New cards

TATP

Homemade explosive made from acetone and peroxide, linked to terrorist attacks.

79
New cards

RDX

Popular military explosive found as pliable plastic C-4.

80
New cards

Debris processing at explosion scenes

Systematic collection of detonator parts and foreign materials in airtight containers.

81
New cards

Lab analysis for explosives

Microscopic analysis, solvent rinses, spot tests, thin-layer chromatography, GCMS, IR spectrophotometry.