Blog

Cyber Crime

Cybercrime Report with the FBI’s IC3

The launch of the World Wide Web in 1989 led to the rapid evolution into the cybersphere we know today. As the internet expanded, so did the prevalence of online crime. In response, the FBI created the Internet Crime Complaint Center (IC3) in 2000 to combat cyber-enabled crimes. The IC3 has gone from receiving 2,000 reports per month to the exact same number each day. However, many victims of cybercrime prefer to not involve law enforcement out of embarrassment or shame. To make the process easier for victims, we’ve outlined everything they need to know about making a cybercrime report with the FBI’s IC3.

What is the IC3?

The IC3 is the FBI’s central hub for reporting cyber-enabled crimes. It was created to collect reports, distribute the complaints to the appropriate agencies, and track national trends regarding cybercrime. Anyone who believes they were affected by an online crime can make a cybercrime report with the FBI’s IC3. The information will then be forwarded to the appropriate law enforcement or partner agencies. The IC3 does not conduct investigations, provide emergency support, or guarantee that action will be taken for your case. However, the IC3 is an ideal place to start when involving the authorities in your cybercrime incident.

What is Cyber-Enabled Crime?

The FBI defines cyber-enabled crime as illegal activity that is performed in part by using digital means. The most common forms of cyber-enabled crime involve bad actors using internet technology to create fraudulent personas or representations. These facades allow cybercriminals to trick online users into sharing sensitive information or money. Here are some of the most common forms of cyber-enabled crime.

  • Computer hacking. Unauthorized access to systems or networks.
  • Employment scams. Fake job listings intended to steal money or personal information.
  • A malicious software that encrypts files unless a ransom is paid.
  • Romance scams. Bad actors fake an online relationship to gain trust and then manipulate the victim into sending money.
  • Identity theft. Scammers steal personal information to commit fraud.
  • Investment scams. Criminals promise high returns on investments to lure in victims.
  • Business Email Compromise (BEC). Scammers pose as co-workers, business partners, or executives to gain access to sensitive data or funds.
  • Criminals coerce victims to comply with demands by claiming they’ll expose explicit images or videos if they don’t obey.
  • Phishing scams. Messages from scammers that trick individuals into giving up personal information and login credentials.

How to File a Complaint with the IC3

You can make a cybercrime report with the FBI’s IC3 through their website. Simply visit the IC3 homepage and select “File a Complaint” to get started. However, children affected by online exploitation should report the incident to the National Center for Missing and Exploited Children instead of the IC3.

Filing a complaint is a 7-step process, and it’s important to know what details you will need before getting started. If you are looking to file a complaint, you’ll need the following information.

  1. Reporting party information. The information of the person affected by the crime. You can file a complaint on behalf of someone else. However, you will enter your own contact information.
  2. Financial transactions. If you experienced any financial loss, you need to enter key details like the total amount lost, account information, transaction dates, and who received the money.
  3. Suspect information. Any information that you have about the person who committed the cybercrime. This could be their name, address, email, website, social media profile, or IP address.
  4. Details of the event. Describe the incident and include information that might help law enforcement understand what happened.
  5. Technical details. Include information about the technical details of the cybercrime, like crypto transaction metadata or email headers.
  6. Possible witnesses. List any possible witnesses to the crime if there are any.
  7. Previous reports about the incident. Provide the details of other law enforcement agencies that you previously reported the crime to if applicable. Lastly, sign the privacy statement and submit your complaint.

What Happens After I Make a Cybercrime Report with the FBI’s IC3?

Once you finish filing a complaint with the IC3, you should see a message stating that the complaint has been successfully submitted. Then, trained analysts will review and research the complaint as well as distribute the information to the appropriate law enforcement and partner agencies. The IC3 does not notify complainants of any updates. All complaints are also included in the IC3’s annual report, tracking regional and national cybercrime trends.

Does the IC3 Accept Evidence?

The IC3 does not accept evidence or attachments. It’s essential to preserve your evidence and keep it in a secure place. If an agency opens an investigation into your case, they will contact you and may request your evidence to support their investigation. Take note of the examples of evidence provided below.

  • Phone bills
  • Credit card receipts
  • Chat transcripts or screenshots
  • Printed or electronic copies of email with header information
  • Wire receipts
  • Canceled checks
  • Money order receipts
  • Printed or electronic copies of webpages
  • Copies of malware

When Should You Report to Another Agency?

  • Crimes involving children. Online crimes involving child exploitation should be reported to the National Center for Missing & Exploited Children (NCMEC). This non-profit runs the CyberTipline, a reporting center for the sexual abuse of minors.
  • Consumer-focused scams. The Federal Trade Commission (FTC) provides a reporting tool for individuals who experienced fraud, scam, or bad business practices. You can report consumer-focused scams on the FTC’s Report Fraud webpage.
  • Local scams. If you have been a victim of a scam or online crime, you should always report it to your local law enforcement. They can help you file an official report and help you recover from the incident.
  • Investment scams. The Securities and Exchange Commission (SEC) investigates investment-related fraud, specifically concerning federal security law violations. You can report fraud to the SEC on their website.

Next Steps for Victims

Making a cybercrime report with the FBI IC3 is essential for many reasons. It not only opens the door for law enforcement support and prosecution of the perpetrator, but it also contributes to the effort to track cybercrime trends nationwide. However, due to the FBI’s heavy caseload, there may be delays before your case is reviewed. While reporting to the IC3 or local authorities is an important first step, you can also turn to digital investigators for immediate assistance.

At Cyber Investigation, it’s our mission to support victims of cybercrime however we can. We have state-of-the-art technology that we use to trace the digital footprint of anonymous cybercriminals. Our team can also help victims after being scammed — either by attempting to recover lost funds or strengthening the victim’s cybersecurity against future attacks. Our experts are available 24/7 to provide immediate and reliable support. You don’t have to face cybercrime alone. Contact us today.

Read More
Scam Email Threatening to Expose Video

It’s one thing to receive a spam email threatening to expose your personal data to the public. When the person on the other end sends a scam email claiming to have videos to support their assertions, the situation instantly becomes more dire. But do they actually have a video of you, or are they just employing classic scare tactics? Keep reading to learn more about video scam emails saying they have videos of you.

What Should I Do If I Get an Email Claiming to Have Videos of Me?

While it’s possible that the scammer has obtained video of you either from a third-party source or through surveillance, these claims are often empty threats. More realistically, the email has been sent to multiple people with the hopes that at least one will believe it. Here’s how you can tell.

Generic Messages

As we stated, these types of video scam emails are often delivered in a mass-email blast to multiple recipients. As such, they are composed of messages that follow a generic outline with limited personal information found from previous data breaches sprinkled in. One way to check if you received a generic spam email is by searching for a portion of the message you were sent to see if other similar examples exist online.

Lack of Evidence

Email scams threatening to expose videos can cloud your judgment — but think critically for a second: If they had a video of you, wouldn’t they at least send a single frame as proof. If the email doesn’t go into specifics on the content they have and fails to tangibly prove the video’s existence, it’s likely a fake claim meant to scare you into complying.

Scare Tactics

If the scammer doesn’t actually have video of you, their entire scheme relies on your fear and belief. To manufacture this, scammers will employ scare tactics. They may throw around names like Pegasus, a well-known form of spyware. They claim that they’ve monitored you for months and acquired a stockpile of footage.

The perpetrator will likely set a deadline for payment and tell you they will know if you contact law enforcement to create a sense of urgency. They may even spoof the email header to make it appear as though the message was sent from your own address.

How to Respond to a Video Scam Email

  • Stay Calm: We understand what you are feeling and the type of duress these video scam emails can put victims under. However, it’s important that you don’t panic and instead proceed with the appropriate course of action.
  • Don’t Engage: You may feel inclined to either respond to the threatening email or block the sender altogether. You should not converse with the cybercriminal, but you’ll want to leave the line intact while you investigate the attack.
  • Analyze the Email: With the information we covered above in mind, evaluate the validity of the threats being sent your way. If it feels like the email could’ve been sent to anyone, it’s probably just spam.
  • Collect Evidence: While you are vetting the validity of the video scam email, document the sender and any details of the message that display the threats being made. Even if they don’t have the dirt on you that they claim to, they’ve still committed a crime.
  • Contact Authorities: Like any cybercrime, you should report the video scam email to law enforcement and the email platform provider. This can help deter your harasser and keep the entire internet a little bit safer in the future.

Consider the Assistance of Cybersecurity Professionals

If you need help at any point in your response, the assistance of cybersecurity experts can be a huge asset. These professionals understand how such schemes unfold from experience. They can help you assess the validity of the threat, gather and document evidence, and determine the optimal path to take to combat your assailant.

You’re Not in This Alone: Cyber Investigation Inc. Can Help

At Cyber Investigation Inc., our team of experts know exactly what to do in the event of a scam email threatening to release private videos. We’ve seen thousands of similar cases, and our 4.93-star rating displays our ability to reach a satisfying resolution for our clients. Here’s what we can do for you.

Take Over Communication

You have enough on your plate and likely don’t have experience conversing with cybercriminals. When you work with CI, we can step into your place and take over communication on your behalf. Our experience handling these cases allows us to delay the harasser, collect valuable intel, and prevent further harm.

Thorough Analysis

Our proprietary tools and techniques allow us to analyze metadata in email headers and any content that has been shared. Through this, we can determine the origin of the email down to the geolocation and the device used to send it. This can allow us to identify the perpetrator.

Malware Detection

Scammers often claim to have captured video of you using your own webcam. Attacks like this require the download of malicious software onto your device. We can scan your device for such programs to determine if unauthorized access to your webcam or microphone has occurred.

Complete Documentation

We chronicle our entire investigation from the minute we pick up your case through its resolution. This ensures that the chain of custody is maintained, and your report can be used as admissible evidence in any legal proceedings.

Ongoing Monitorization

After your case has concluded, we can still be of assistance. We can provide continual monitoring for security threats to help you avoid falling into similar traps in the future. Additionally, we can assess your current system and internet practices to help you beef up your cybersecurity.

Moving Forward: Safe Online Practices

Unfortunately, there is always a threat of bad actors engaging you online. However, there are steps you can take to minimize your chances of experiencing their harmful behavior:

  • Secure Your Accounts: Update your passwords regularly, especially if you are notified that they’ve been compromised in a breach. A password manager can help you update and store your passwords. Additionally, using two-factor authentication (2FA) can add an extra level of security to your online accounts.
  • Avoid Oversharing: This may seem like an obvious step. Don’t share compromising videos online. But with the advancement of AI deepfake technology, you also have to be wary of who can see your innocent media.
  • Don’t Click Suspicious Links: Many video scam emails claim to have videos that they don’t and contain links to either make payment or view the alleged content. These links often contain malware and clicking on them may open you up to a legitimate spyware scam.
  • Use a Reputable Antivirus: Regularly scan your devices to detect any unwanted programs and malicious software. This can help you determine the validity of a spyware claim and protect your personal data from the wrong hands.

And if you are experiencing a scammer threatening to release videos of you, remember that you are not alone. Reach out to Cyber Investigation Inc. today and let us help you protect your reputation and restore your peace of mind.

Read More
Instagram Cyber Crime

We all love using Instagram to stay informed, share stories and interact with friends and family, but did you know that cybercrime is a growing threat to user safety? It is true – as we become more connected on social media platforms, criminals leverage our data for financial gain. Read on to learn more about Instagram cyber crime tactics so you can take steps toward safeguarding yourself online.

Continue reading Instagram Cyber Crime: Types of Attacks and How to Protect Yourself

Read More