Solved

what info is needed to have the cops research a cybercrime?

Posted on 2016-10-20
7
29 Views
Last Modified: 2016-11-18
I've been doing with the hacker and I'm trying to get them to stop. The only way I think it's going to happen is if I have their devices seized and at that point start a civil case against them.  I've been able to track IP addresses ,Mac addresses, Hostnames and other various pieces of information. What do I need to give the police in order for them to investigate the information further do they can get their exact geolocation?
Anyone have any advice?
0
Comment
Question by:Fulgencio Eres
7 Comments
 
LVL 20

Accepted Solution

by:
masnrock earned 250 total points (awarded by participants)
ID: 41851962
If you don't mind my asking, what is the crime in question? Depending on what it is, you're going to need to show evidence of the criminal accessing or stealing data, tampering with files, etc. Could also go as far as firewall and system logs.
0
 
LVL 33

Assisted Solution

by:paulmacd
paulmacd earned 125 total points (awarded by participants)
ID: 41852052
Yeah, first off, you're going to have to prove a crime was committed and/or that you suffered a loss of some sort.  Then it will likely become a matter of handing over all the evidence you have related to the crime.

Calling your local police, and then the FBI would probably be the best places to start.
0
 
LVL 70

Assisted Solution

by:Merete
Merete earned 125 total points (awarded by participants)
ID: 41854772
When you feel you have been hacked
The most important thing you should do is change your passwords. Alert you email friends and increase your security protection. Insure your system is up to date. Run windows defender scan.
You have not told us why you believe you're being hacked? What are your suspicions based on.
You may not be actually hacked.
Do you have any Peer to Peer software installed for downloading files? Like Napster or Bittorrent?
If you have then it's possible once you have completed your download unless it's closed  immediately ( leeching) it will begin uploading
How BitTorrent Works
http://computer.howstuffworks.com/bittorrent1.htm

Have a look at Spotting the Signs of a Possible Hacking
http://www.wikihow.com/Know-if-You've-Been-Hacked
You also asking about this here might be a good idea to keep the question in one
https://www.experts-exchange.com/questions/28977835/what-connections-should-be-in-my-network-connection-logs.html
0
What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

 
LVL 20

Expert Comment

by:masnrock
ID: 41855193
Another key thing is to make a forensic image with a tool like EnCase or Redline so that there is something to analyze. And do NOT turn off the system before you do so (taking it offline is acceptable).
0
 

Author Comment

by:Fulgencio Eres
ID: 41865589
and that forensic file can tell me what exactly?
0
 
LVL 20

Assisted Solution

by:masnrock
masnrock earned 250 total points (awarded by participants)
ID: 41865681
You can use the forensic file to trace when and how strange events occurred. For example, I dealt with an office that got their entire NAS drive share encrypted. Turned out that it was done from a server that had RDP port open, and hackers were able to brute force their way into an account. I also got info on the files they loaded onto the server, and exactly how they got executed. Also had timestamps, etc.
0
 
LVL 70

Expert Comment

by:Merete
ID: 41892667
All comments have a solution
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Working settings for French ISP Orange "Prêt à Surfer" SIM cards for data connections only. Can't be found anywhere else !
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now