CFS280 SQLite Lab

Case Overview: ABQ-737-BLUE

Late last night, Albuquerque Police recovered a burner phone during a search of a suspicious vehicle abandoned near a commercial laundry facility in the North Valley.

Preliminary forensic triage indicates the device contains a collection of SQLite databases used by local narcotics distributors to coordinate logistics. Your objective is to authorize the extraction, navigate the complex database schema, and isolate the "smoking gun" communication that links the suspect to the alias 'Heisenberg'.

Investigator Identity Required

Unauthorized access is a federal offense • APD Digital Forensics Unit

APD Forensic Laboratory: ABQ-737-BLUE

Evidence Extraction

Live Extraction

SQL Fundamentals Reference

Use this guide to master the commands required for mobile database extraction. Remember: Every command must end with a semicolon (;).

1. Basic Retrieval

SELECT * FROM contacts;

2. Filtering Data

SELECT * FROM contacts WHERE name = 'Jesse Pinkman';

3. Keyword Search

SELECT * FROM messages WHERE body LIKE '%territory%';

4. Joining Tables

SELECT contacts.name, messages.body FROM messages JOIN contacts ON messages.contact_id = contacts.id;