You are given a cellphone of an unknown owner. You must look for evidence of terrorism by hacking into the cellphone owner's account, under governmental coercion. Then inspecting the cellphone usage history and social media activity records.

Continue ReadingReplica