Assignment # 1- The Harvard Hoax Bomb Investigation
In 2013, Harvard University received a bomb threat. The threat was a hoax and the suspect Eldo Kim left a digital trail of evidence behind that led right to him. This case is a great example of how a Cyber Crime does not have to be complicated. You do not need to be a computer guru to solve the case. A basic familiarity with some subjects and an effective method of information gathering and knowing where to look can lead you right to the suspect.
For this case, analyze the case investigation and the methods used by the investigators. Do your research to find reliable and credible sources. There is a lot of information available on this case, all you have to do is look. Detail the methods the investigators used and explain the purpose of the methods.
What role did the identification of the IP Address, MAC address, Tor /Tails, and other topics covered in the first two modules play in the investigation and its outcome?
Ultimately, how where the methods applied during the investigation to find the suspect. Feel free to theorize additional steps that one could have taken.
Module 1: Footsteps Left Behind by Suspects/ Tor and Tails
Getting Started and Moving Forward Through the Course
The Dark Web is based on being anonymous. With the Dark Web, the focus is on the Tor browser and changing the pieces of identifying information left behind on a trail. How do criminals erase the footsteps they leave behind when committing an offense? To know how those steps are erased, you must know how they are left behind, to begin with.
Module 1 for this course will discuss the IP address and MAC address and their functions as well as the installation of the Tor browser or Tails. This section will also discuss the methods of obtaining the information and investigating what was left behind.
Prior to this semester, the installation of Tor and / or Tails was done in week 2. I didn’t want to lose a week of having everyone be able to miss out on a week of Dark Web browsing. Realize that the Tor browser is all about the IP address and trying to hide what is there. It makes sense to have the two of them go together.
The Onion Router (Tor)
So here is the big moment you all have been waiting for. Let’s get to the Dark Web. Install the Tor browser. In the past I had people complain that they did not want to put it on their computer because they were afraid that something would happen to their system. If you want to install Tails and use that it is fine.
Though it is more difficult to take screenshots on Tails and screens shots from the Tor browser are required for your writing assignments. I’ve never had anything bad happen to my system. When I was a cop and today, I have run Tor right from my desktop. I do not download anything and I’m not doing anything wrong, so I have nothing to hide. You will not be required to download anything, but I do want you to see first-hand how this works.
* If you don’t want to put it on your desktop and don’t want to use Tails, just install Tor onto a USB or Thumb Drive like it is shown in the Quantech video below
From reading the information on the Tor project you will learn how Tor was developed off of Firefox. There are a lot of security features on Tor and it is pretty exciting when you first get on there. You will see the randomness of the URL is a crazy mixture of letters and numbers. Some of them spell out some words like on Silk Road when the developer messes with them. For the most part, they are random. You are not going to go on to the Dark Web and type in www.drugs.onion. It doesn’t work that way.
The .onion comes from the onion router idea. Everything on the Dark Web for the Tor browser is .onion. There are some other Dark Web browsers out there like I2P but we are going to focus on Tor and the Onion sites.
The post In 2013, Harvard University Received a Bomb Threat. The Threat was a Hoax: Investigations Assignment, NKU, US appeared first on .