During ongoing monitoring of a suspicious online persona, analysts identified a username that appears across multiple unrelated activities.
The account itself reveals very little, but small details such as naming conventions, profile content, and public traces may help correlate the identity elsewhere online.
Your task is to investigate the username and determine whether it has been reused on another platform. Identify the second account most strongly associated with the same persona.
During ongoing monitoring of a suspicious online persona, analysts intercepted an email believed to be associated with the same individual previously observed sharing public activity data.
The message does not appear to be a typical phishing attempt, but may indicate involvement in unauthorized access to external systems.
Initial review suggests the email may have originated from infrastructure unrelated to the sender’s claimed identity.
Your task is to analyze the email metadata, identify the true origin of the message, and determine where the email was sent from.
A video circulating online claims to show structural damage to a building on March 28, 2025 following an earthquake.The original post does not include any reliable location metadata, and the authenticity of the footage is unknown.
During a review of public digital traces tied to a suspicious online persona, analysts identified a fitness-tracking account that may belong to the same individual operating under a different identity.
The account appeared harmless at first glance, containing several running activities with routine titles and publicly shared route maps. However, repeated activity patterns, route geometry, timestamps, and recurring landmarks may reveal more information than intended.
Your task is to review the recovered evidence and determine what the subject’s activity history reveals. By analyzing the routes and identifying repeated locations, determine the city most strongly associated with the account and the public landmark that appears central to the subject’s activity pattern.
Connection Log
Source IP: 223.130.192.2
Message:경복궁은 서울에서 가장 유명한 궁궐이다
Challenge Description:
During an investigation, analysts recovered a connection log from a remote server.The log contains a source IP address and a message written in a foreign language.Your mission is to analyze the IP address, determine the origin of the message, translate the text, and identify the real-world location being referenced.
An intercepted radio transmission was captured during routine monitoring operations.The signal appears structured and repetitive, suggesting a deliberate encoded message.Your mission is to analyze the audio transmission, decode the signal, and determine the real-world location being referenced.
A photograph was recovered during an investigation.
At first glance, the image appears completely unrelated to any specific location. However, digital files often contain hidden information embedded within their metadata.
Your mission is to analyze the image file and determine the real-world location referenced in the hidden message.