Solved

what info is needed to have the cops research a cybercrime?

Posted on 2016-10-20
7
37 Views
Last Modified: 2016-11-18
I've been doing with the hacker and I'm trying to get them to stop. The only way I think it's going to happen is if I have their devices seized and at that point start a civil case against them.  I've been able to track IP addresses ,Mac addresses, Hostnames and other various pieces of information. What do I need to give the police in order for them to investigate the information further do they can get their exact geolocation?
Anyone have any advice?
0
Comment
Question by:Fulgencio Eres
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 28

Accepted Solution

by:
masnrock earned 250 total points (awarded by participants)
ID: 41851962
If you don't mind my asking, what is the crime in question? Depending on what it is, you're going to need to show evidence of the criminal accessing or stealing data, tampering with files, etc. Could also go as far as firewall and system logs.
0
 
LVL 34

Assisted Solution

by:Paul MacDonald
Paul MacDonald earned 125 total points (awarded by participants)
ID: 41852052
Yeah, first off, you're going to have to prove a crime was committed and/or that you suffered a loss of some sort.  Then it will likely become a matter of handing over all the evidence you have related to the crime.

Calling your local police, and then the FBI would probably be the best places to start.
0
 
LVL 70

Assisted Solution

by:Merete
Merete earned 125 total points (awarded by participants)
ID: 41854772
When you feel you have been hacked
The most important thing you should do is change your passwords. Alert you email friends and increase your security protection. Insure your system is up to date. Run windows defender scan.
You have not told us why you believe you're being hacked? What are your suspicions based on.
You may not be actually hacked.
Do you have any Peer to Peer software installed for downloading files? Like Napster or Bittorrent?
If you have then it's possible once you have completed your download unless it's closed  immediately ( leeching) it will begin uploading
How BitTorrent Works
http://computer.howstuffworks.com/bittorrent1.htm

Have a look at Spotting the Signs of a Possible Hacking
http://www.wikihow.com/Know-if-You've-Been-Hacked
You also asking about this here might be a good idea to keep the question in one
https://www.experts-exchange.com/questions/28977835/what-connections-should-be-in-my-network-connection-logs.html
0
Manage your data center from practically anywhere

The KN8164V features HD resolution of 1920 x 1200, FIPS 140-2 with level 1 security standards and virtual media transmissions at twice the speed. Built for reliability, the KN series provides local console and remote over IP access, ensuring 24/7 availability to all servers.

 
LVL 28

Expert Comment

by:masnrock
ID: 41855193
Another key thing is to make a forensic image with a tool like EnCase or Redline so that there is something to analyze. And do NOT turn off the system before you do so (taking it offline is acceptable).
0
 

Author Comment

by:Fulgencio Eres
ID: 41865589
and that forensic file can tell me what exactly?
0
 
LVL 28

Assisted Solution

by:masnrock
masnrock earned 250 total points (awarded by participants)
ID: 41865681
You can use the forensic file to trace when and how strange events occurred. For example, I dealt with an office that got their entire NAS drive share encrypted. Turned out that it was done from a server that had RDP port open, and hackers were able to brute force their way into an account. I also got info on the files they loaded onto the server, and exactly how they got executed. Also had timestamps, etc.
0
 
LVL 70

Expert Comment

by:Merete
ID: 41892667
All comments have a solution
0

Featured Post

Online Training Solution

Drastically shorten your training time with WalkMe's advanced online training solution that Guides your trainees to action. Forget about retraining and skyrocket knowledge retention rates.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this article we have discussed about the OS X EI Capitan and how to fix Wi-Fi issue in OS X El Capitan. We have explained how to delete system level preferences and create a new Wi-Fi location to resolve Wi-Fi issue.
Load balancing is the method of dividing the total amount of work performed by one computer between two or more computers. Its aim is to get more work done in the same amount of time, ensuring that all the users get served faster.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question