Emma’s Log File

Fulfills Step 4 of GSUSA Cadette Cybersecurity Investigator badge requirements.

Info Needed for badge requirements: A Device Log is like a diary for a computer, tablet, or phone. It keeps track of who used the device, what they did, and when they did it. For example, it might show that someone sent a text at 3:00 PM or watched a video at 4:15 PM. These logs are helpful for figuring out problems or understanding how the device was used

Items Needed

  • Copies of VTK Log File by GSUSA for each group of 4-6 scouts
  • Pens or pencils for note-taking.

Instructions

  1. Scenario Introduction: Today, you’ll investigate a library computer log to help Emma clear her name. After her laptop was stolen, Emma used a library computer to write and email her school paper. However, she was shocked to receive an “F” because someone else submitted the same paper. Emma is sure the log files can prove she didn’t cheat
  2. Divide scouts into groups of 4-6 and give each group a copy of the Log File. Ask them to carefully examine the log to find out what happened. Encourage them to look for clues about when Emma’s USB was used and who might have accessed it.
  3. Scouts should find these key clues in the log file:
    • Emma printed her paper at 12:12 from PC06.
    • At 12:28, her USB drive was removed improperly.
    • At 12:29, “mlcoffee” logged in on PC07 and inserted Emma’s USB.
    • “mlcoffee” printed Emma’s paper at 12:31 and logged out by 12:33.
    • At the same time, the USB was reinserted into Emma’s PC.
  4. After scouts have discovered the answer, Talk about the importance of logging out and safely removing USB drives.

Answer for Leaders: Emma had left her USB drive in PC06 while she was away, giving someone else the chance to copy her paper.