what info is needed to have the cops research a cybercrime?

I've been doing with the hacker and I'm trying to get them to stop. The only way I think it's going to happen is if I have their devices seized and at that point start a civil case against them.  I've been able to track IP addresses ,Mac addresses, Hostnames and other various pieces of information. What do I need to give the police in order for them to investigate the information further do they can get their exact geolocation?
Anyone have any advice?
Fulgencio EresAsked:
Who is Participating?
 
masnrockCommented:
If you don't mind my asking, what is the crime in question? Depending on what it is, you're going to need to show evidence of the criminal accessing or stealing data, tampering with files, etc. Could also go as far as firewall and system logs.
0
 
Paul MacDonaldDirector, Information SystemsCommented:
Yeah, first off, you're going to have to prove a crime was committed and/or that you suffered a loss of some sort.  Then it will likely become a matter of handing over all the evidence you have related to the crime.

Calling your local police, and then the FBI would probably be the best places to start.
0
 
MereteCommented:
When you feel you have been hacked
The most important thing you should do is change your passwords. Alert you email friends and increase your security protection. Insure your system is up to date. Run windows defender scan.
You have not told us why you believe you're being hacked? What are your suspicions based on.
You may not be actually hacked.
Do you have any Peer to Peer software installed for downloading files? Like Napster or Bittorrent?
If you have then it's possible once you have completed your download unless it's closed  immediately ( leeching) it will begin uploading
How BitTorrent Works
http://computer.howstuffworks.com/bittorrent1.htm

Have a look at Spotting the Signs of a Possible Hacking
http://www.wikihow.com/Know-if-You've-Been-Hacked
You also asking about this here might be a good idea to keep the question in one
https://www.experts-exchange.com/questions/28977835/what-connections-should-be-in-my-network-connection-logs.html
0
Protect Your Employees from Wi-Fi Threats

As Wi-Fi growth and popularity continues to climb, not everyone understands the risks that come with connecting to public Wi-Fi or even offering Wi-Fi to employees, visitors and guests. Download the resource kit to make sure your safe wherever business takes you!

 
masnrockCommented:
Another key thing is to make a forensic image with a tool like EnCase or Redline so that there is something to analyze. And do NOT turn off the system before you do so (taking it offline is acceptable).
0
 
Fulgencio EresAuthor Commented:
and that forensic file can tell me what exactly?
0
 
masnrockCommented:
You can use the forensic file to trace when and how strange events occurred. For example, I dealt with an office that got their entire NAS drive share encrypted. Turned out that it was done from a server that had RDP port open, and hackers were able to brute force their way into an account. I also got info on the files they loaded onto the server, and exactly how they got executed. Also had timestamps, etc.
0
 
MereteCommented:
All comments have a solution
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.