Examine. Analyze. Conclude. — Step into the shoes of a cyber investigator and crack real-world digital crime scenarios.
Participants take on the role of cyber investigators and analyze a set of digital evidence provided in the form of printed case files. Each participant solves multiple cyber-crime scenarios by examining clues such as login records, emails, activity logs, and other digital traces.
The objective is to identify the hacker and justify the conclusion using logical reasoning and evidence analysis. All responses are submitted in writing — no electronic devices required or permitted.
Participants receive printed case files containing digital evidence: login records, email threads, activity logs, and other digital traces. Working individually, they must identify the hacker behind each scenario and justify their conclusion through written reasoning.
| # | Criterion | Marks |
|---|---|---|
| 1 | Accuracy of Solution | 20 |
| 2 | Logical Reasoning | 10 |
| 3 | Evidence Analysis | 10 |
| 4 | Time Efficiency | 10 |
| Total | 50 |
Tiebreaker: Quality of reasoning & accuracy of evidence analysis. If still tied, the participant who completed the cases in lesser time ranks higher.