Blog

Cybercrime Report with the FBI’s IC3

The launch of the World Wide Web in 1989 led to the rapid evolution into the cybersphere we know today. As the internet expanded, so did the prevalence of online crime. In response, the FBI created the Internet Crime Complaint Center (IC3) in 2000 to combat cyber-enabled crimes. The IC3 has gone from receiving 2,000 reports per month to the exact same number each day. However, many victims of cybercrime prefer to not involve law enforcement out of embarrassment or shame. To make the process easier for victims, we’ve outlined everything they need to know about making a cybercrime report with the FBI’s IC3.

What is the IC3?

The IC3 is the FBI’s central hub for reporting cyber-enabled crimes. It was created to collect reports, distribute the complaints to the appropriate agencies, and track national trends regarding cybercrime. Anyone who believes they were affected by an online crime can make a cybercrime report with the FBI’s IC3. The information will then be forwarded to the appropriate law enforcement or partner agencies. The IC3 does not conduct investigations, provide emergency support, or guarantee that action will be taken for your case. However, the IC3 is an ideal place to start when involving the authorities in your cybercrime incident.

What is Cyber-Enabled Crime?

The FBI defines cyber-enabled crime as illegal activity that is performed in part by using digital means. The most common forms of cyber-enabled crime involve bad actors using internet technology to create fraudulent personas or representations. These facades allow cybercriminals to trick online users into sharing sensitive information or money. Here are some of the most common forms of cyber-enabled crime.

  • Computer hacking. Unauthorized access to systems or networks.
  • Employment scams. Fake job listings intended to steal money or personal information.
  • A malicious software that encrypts files unless a ransom is paid.
  • Romance scams. Bad actors fake an online relationship to gain trust and then manipulate the victim into sending money.
  • Identity theft. Scammers steal personal information to commit fraud.
  • Investment scams. Criminals promise high returns on investments to lure in victims.
  • Business Email Compromise (BEC). Scammers pose as co-workers, business partners, or executives to gain access to sensitive data or funds.
  • Criminals coerce victims to comply with demands by claiming they’ll expose explicit images or videos if they don’t obey.
  • Phishing scams. Messages from scammers that trick individuals into giving up personal information and login credentials.

How to File a Complaint with the IC3

You can make a cybercrime report with the FBI’s IC3 through their website. Simply visit the IC3 homepage and select “File a Complaint” to get started. However, children affected by online exploitation should report the incident to the National Center for Missing and Exploited Children instead of the IC3.

Filing a complaint is a 7-step process, and it’s important to know what details you will need before getting started. If you are looking to file a complaint, you’ll need the following information.

  1. Reporting party information. The information of the person affected by the crime. You can file a complaint on behalf of someone else. However, you will enter your own contact information.
  2. Financial transactions. If you experienced any financial loss, you need to enter key details like the total amount lost, account information, transaction dates, and who received the money.
  3. Suspect information. Any information that you have about the person who committed the cybercrime. This could be their name, address, email, website, social media profile, or IP address.
  4. Details of the event. Describe the incident and include information that might help law enforcement understand what happened.
  5. Technical details. Include information about the technical details of the cybercrime, like crypto transaction metadata or email headers.
  6. Possible witnesses. List any possible witnesses to the crime if there are any.
  7. Previous reports about the incident. Provide the details of other law enforcement agencies that you previously reported the crime to if applicable. Lastly, sign the privacy statement and submit your complaint.

What Happens After I Make a Cybercrime Report with the FBI’s IC3?

Once you finish filing a complaint with the IC3, you should see a message stating that the complaint has been successfully submitted. Then, trained analysts will review and research the complaint as well as distribute the information to the appropriate law enforcement and partner agencies. The IC3 does not notify complainants of any updates. All complaints are also included in the IC3’s annual report, tracking regional and national cybercrime trends.

Does the IC3 Accept Evidence?

The IC3 does not accept evidence or attachments. It’s essential to preserve your evidence and keep it in a secure place. If an agency opens an investigation into your case, they will contact you and may request your evidence to support their investigation. Take note of the examples of evidence provided below.

  • Phone bills
  • Credit card receipts
  • Chat transcripts or screenshots
  • Printed or electronic copies of email with header information
  • Wire receipts
  • Canceled checks
  • Money order receipts
  • Printed or electronic copies of webpages
  • Copies of malware

When Should You Report to Another Agency?

  • Crimes involving children. Online crimes involving child exploitation should be reported to the National Center for Missing & Exploited Children (NCMEC). This non-profit runs the CyberTipline, a reporting center for the sexual abuse of minors.
  • Consumer-focused scams. The Federal Trade Commission (FTC) provides a reporting tool for individuals who experienced fraud, scam, or bad business practices. You can report consumer-focused scams on the FTC’s Report Fraud webpage.
  • Local scams. If you have been a victim of a scam or online crime, you should always report it to your local law enforcement. They can help you file an official report and help you recover from the incident.
  • Investment scams. The Securities and Exchange Commission (SEC) investigates investment-related fraud, specifically concerning federal security law violations. You can report fraud to the SEC on their website.

Next Steps for Victims

Making a cybercrime report with the FBI IC3 is essential for many reasons. It not only opens the door for law enforcement support and prosecution of the perpetrator, but it also contributes to the effort to track cybercrime trends nationwide. However, due to the FBI’s heavy caseload, there may be delays before your case is reviewed. While reporting to the IC3 or local authorities is an important first step, you can also turn to digital investigators for immediate assistance.

At Cyber Investigation, it’s our mission to support victims of cybercrime however we can. We have state-of-the-art technology that we use to trace the digital footprint of anonymous cybercriminals. Our team can also help victims after being scammed — either by attempting to recover lost funds or strengthening the victim’s cybersecurity against future attacks. Our experts are available 24/7 to provide immediate and reliable support. You don’t have to face cybercrime alone. Contact us today.

Read More
Online Harassment

In 2021, Pew Research Center found that 4 in 10 American adults have experienced online harassment. The severity of the harassment ranged from physical threats to name-calling. In any case, the prevalence of online harassment has continued to grow over the years. Now, internet users need to be aware of the risks and how to stop online harassment if they are ever targeted. 

What is Considered Harassment? 

Cyber harassment is defined as the use of electronic communication with the intent to harass or intimidate another person, causing emotional harm or distress. There are multiple means of communication through which cyber harassment can occur, such as email, social media, dating sites, and other platforms. 

Tactics of a Criminal: Strategies and Behaviors of Online Harassment 

Online harassers are not all the same, but they use similar tactics to target victims and for similar reasons. There is a mix of social dynamics and psychological motivations that can contribute to the behavior of these criminals. The digital era has only increased the number of online harassers and amplified their reach. Below are some of the common motivations and patterns that have been observed in online harassers. 

  • Using anonymity. The internet allows bad actors to operate anonymously from all around the world. Their anonymity not only protects criminals from being held accountable for their actions, but it also encourages them to do and say things they wouldn’t in-person. 
  • Wanting power or control. Perpetrators typically desire power or control over others. They use cyber harassment to intimidate specific targets. 
  • Feeling insecurity. Feeling threatened by the positive attributes of others, they can operate from a place of insecurity and may target individuals to tear others down.  
  • Lacking empathy. Perpetrators often harass victims online without considering the real-world implications of their actions. By focusing on the digital interactions, they dehumanize their targets and see them only as usernames. 
  • Craving attention. Cyber harassment typically stems from something missing in the culprit’s personal life. Harassers may want attention or a sense of power and gain that comes from targeting someone online. 
  • Seeking revenge. Some cyber harassers know their targets in real life. It may be a former partner, friend, or acquaintance that has a vendetta against the victim. 

How to Respond to Online Harassment 

Stopping online harassment can be difficult. The perpetrator hides behind anonymity to operate without accountability and can make multiple profiles to continue the abuse even after their profile gets blocked or removed. The barrage of harassment can make victims feel helpless, but you can take control of the situation — even in the face of an anonymous culprit. 

Assess the threat 

The first step in responding to online harassment is to assess the severity of the threat. There are many forms of cyber harassment, ranging from mild to extremely severe. Low-level harassment, like comments or one-time messages, is common on social media platforms. Long-term and repeated behavior or threats can be a sign of real-world danger and should be taken seriously. 

Stop interacting with the criminal 

Engaging with the perpetrator only encourages them to continue their online harassment. Instead, immediately cease all communications with your harasser. If the harasser can’t easily get in touch with you, they are more likely to become disinterested. 

Preserve everything 

If you want to take legal action against your offender, you need evidence of the online harassment to use in court. Be sure to document all messages, suspicious profiles, images, and anything else that’s relevant to present to law enforcement or legal professionals. 

Notify online platforms and law enforcement 

When it comes to more severe online harassment like image-based abuse or threats, notifying law enforcement is vital. They can help you file an official case, legally recording the incident. This ensures that your evidence can be used in court or in a law enforcement investigation.  

Victims should also notify online platforms of cyber harassment. Many types of harassment violate the community standards of social media networks, and profiles engaging in such behavior will be removed from the platform. 

Change security settings 

With an anonymous perpetrator, it’s challenging to know their intentions or the danger they present. The only thing you can be sure of is that you are being targeted, so it’s best to secure your accounts and devices. Your passwords need to be strong enough to protect your information. Additionally, make sure two-factor authentication is enabled wherever it’s possible. 

Use support resources 

Online harassment has existed for decades. Over time, many non-profit organizations were created to combat cyber harassment and provide resources to victims.  

  • Without My Consent. A non-profit with the mission to combat invasions of privacy and online harassment. The organization offers educational resources for victims on how to respond to harassment and image-based sexual abuse. 
  • Crisis Text Line. Offers a free, confidential support line through text messages. Trained volunteers provide mental health support and crisis intervention 24/7(4). 
  • Right To Be. This non-profit fights harassment in-person and online. The organization provides bystander intervention education and resources to help victims of online harassment. 

Work with legal professionals 

Unfortunately, attorneys can only pursue legal action against perpetrators who are identifiable. Cybercriminals hiding behind anonymity can often evade such legal action. However, if the harasser is identified and linked to evidence, attorneys can assist with filing lawsuits, restraining orders, and cease and desist letters. 

Ways To Prevent Yourself from Becoming a Target 

Anyone with an online presence can become a target for online harassment. The reason for this targeting can stem from something that occurred in real-life or over the internet. However, there are ways to make it more challenging for perpetrators to digitally harass you and minimize the risk of becoming a victim. 

Strengthen privacy settings 

Your online presence may attract online harassers or can get exploited by bad actors to contact you. But social media platforms offer privacy settings that can limit interactions with strangers on their sites and protect the posts or information you have on your profile. 

Be mindful of what you post online 

If your posts are not private, your information can be exposed to millions of users all over the world. Some of these users are bound to have malicious intentions. Making sure your profile and posts are private is one thing, but some harassers may already be your friends or followers. If this is the case, sharing your location, full name, or workplace can increase the risk of cyber harassment. 

Avoid trolls 

Trolls are everywhere on the internet. They are in forums, comment sections, direct messages, and more. Most of the time, trolls engage online with the intent to upset someone else. Responding to these trolls in any capacity can encourage further digital harassment and, possibly, obsessive targeting.  

Stop Online Harassment by Working with Cyber Investigation Inc. 

If you are facing an anonymous online harasser, Cyber Investigation Inc. has you covered. We specialize in removing the anonymity of cybercriminals, making it simpler for you to hold your offender accountable. Using digital forensics and investigative methods, we can trace the digital footprint of the perpetrator and pinpoint their geolocation. Then, our team of experts can uncover the culprit’s identity and leverage this information to stop cyber harassment in its tracks. Available 24/7, Cyber Investigation Inc. is always ready to fight against cybercriminals. All you have to do is give us a call. 

Read More