← Back to Events
Critical Thinking

Digital Forensics

Examine. Analyze. Conclude. — Step into the shoes of a cyber investigator and crack real-world digital crime scenarios.

Format: Paper-Based
Mode: Individual
Duration: 2 Hours
Max Participants: 15
Open To: Classes 5–12
Venue: Senior Lab (Computer Lab)
Overview

Participants take on the role of cyber investigators and analyze a set of digital evidence provided in the form of printed case files. Each participant solves multiple cyber-crime scenarios by examining clues such as login records, emails, activity logs, and other digital traces.

The objective is to identify the hacker and justify the conclusion using logical reasoning and evidence analysis. All responses are submitted in writing — no electronic devices required or permitted.

Pre-Event — Selection Round
When
2–3 weeks after registration closes
Format
Case-solving challenge
Duration
1.5 hours
Judging Basis
Speed + logic given
Who Proceeds
Top 15 participants
Event Structure
Round 1 (Final) — 1.5 Hours
Final Investigation Round

Participants receive printed case files containing digital evidence: login records, email threads, activity logs, and other digital traces. Working individually, they must identify the hacker behind each scenario and justify their conclusion through written reasoning.

  • Paper-based investigation challenge with printed case files
  • Written responses only — no electronic devices
  • All conclusions must be supported with proper reasoning
  • Answers without justification may not receive full marks
  • Participants may use rough sheets for analysis
  • Clarification from organisers is permitted only if allowed at the time
Judging & Scoring
# Criterion Marks
1Accuracy of Solution20
2Logical Reasoning10
3Evidence Analysis10
4Time Efficiency10
Total50

Tiebreaker: Quality of reasoning & accuracy of evidence analysis. If still tied, the participant who completed the cases in lesser time ranks higher.

Rules & Guidelines
Allowed
  • Logical reasoning applied individually to the case
  • Use of rough sheets for analysis
  • Careful examination of all provided evidence
  • Asking organisers for clarification (only if permitted during the event)
Not Allowed
  • Use of internet or electronic devices (phones, laptops, etc.)
  • Communicating or sharing answers with other participants
  • Seeking external help from teachers, friends, or others
  • Tampering with or exchanging case materials
Event Hosts
Host Aashi Mishra — Class XII-C
Host Alankrit — Class XI