Harvard bomb hoaxer used Tor, got caught anyway

Summary:Eldo Kim, Harvard student, wanted to get out of a final exam so he sent in a bomb threat using Tor to disguise his location and identity. Tor's not magic and the FBI caught him anyway.

tor-logo[1]

Monday's bomb scare at Harvard was perpetrated by a sophomore "motivated by a desire to avoid a final exam..."

Even though Eldo Kim, 20, used the Tor network, in conjunction with an anonymous email service Guerilla Mail, to hide his location and identity, the FBI didn't have a lot of trouble locating him because he used the Harvard wireless network to send the threat. Some of the details of his critical error are spelled out in an affadavit filed by FBI Special Agent Thomas M Dalton in support of an arrest. The fact that the threats came on the day of finals was a good indicator that a student was responsible.

The affadavit doesn't give details on how he was traced, and it worked to a point. But the FBI and school IT were able to determine who was using that software at the time the emails were sent. That pointed to Kim's login.

Hat tip to On The Media.

Topics: Security

About

Larry Seltzer has long been a recognized expert in technology, with a focus on mobile technology and security in recent years. He was most recently Editorial Director of BYTE, Dark Reading and Network Computing at UBM Tech. Prior to that he spent over a decade consulting and writing on technology subjects, primarily in the area of sec... Full Bio

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.