Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

what info is needed to have the cops research a cybercrime?

Posted on 2016-10-20
7
Medium Priority
?
47 Views
Last Modified: 2016-11-18
I've been doing with the hacker and I'm trying to get them to stop. The only way I think it's going to happen is if I have their devices seized and at that point start a civil case against them.  I've been able to track IP addresses ,Mac addresses, Hostnames and other various pieces of information. What do I need to give the police in order for them to investigate the information further do they can get their exact geolocation?
Anyone have any advice?
0
Comment
Question by:Fulgencio Eres
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 31

Accepted Solution

by:
masnrock earned 1000 total points (awarded by participants)
ID: 41851962
If you don't mind my asking, what is the crime in question? Depending on what it is, you're going to need to show evidence of the criminal accessing or stealing data, tampering with files, etc. Could also go as far as firewall and system logs.
0
 
LVL 34

Assisted Solution

by:Paul MacDonald
Paul MacDonald earned 500 total points (awarded by participants)
ID: 41852052
Yeah, first off, you're going to have to prove a crime was committed and/or that you suffered a loss of some sort.  Then it will likely become a matter of handing over all the evidence you have related to the crime.

Calling your local police, and then the FBI would probably be the best places to start.
0
 
LVL 70

Assisted Solution

by:Merete
Merete earned 500 total points (awarded by participants)
ID: 41854772
When you feel you have been hacked
The most important thing you should do is change your passwords. Alert you email friends and increase your security protection. Insure your system is up to date. Run windows defender scan.
You have not told us why you believe you're being hacked? What are your suspicions based on.
You may not be actually hacked.
Do you have any Peer to Peer software installed for downloading files? Like Napster or Bittorrent?
If you have then it's possible once you have completed your download unless it's closed  immediately ( leeching) it will begin uploading
How BitTorrent Works
http://computer.howstuffworks.com/bittorrent1.htm

Have a look at Spotting the Signs of a Possible Hacking
http://www.wikihow.com/Know-if-You've-Been-Hacked
You also asking about this here might be a good idea to keep the question in one
https://www.experts-exchange.com/questions/28977835/what-connections-should-be-in-my-network-connection-logs.html
0
Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

 
LVL 31

Expert Comment

by:masnrock
ID: 41855193
Another key thing is to make a forensic image with a tool like EnCase or Redline so that there is something to analyze. And do NOT turn off the system before you do so (taking it offline is acceptable).
0
 

Author Comment

by:Fulgencio Eres
ID: 41865589
and that forensic file can tell me what exactly?
0
 
LVL 31

Assisted Solution

by:masnrock
masnrock earned 1000 total points (awarded by participants)
ID: 41865681
You can use the forensic file to trace when and how strange events occurred. For example, I dealt with an office that got their entire NAS drive share encrypted. Turned out that it was done from a server that had RDP port open, and hackers were able to brute force their way into an account. I also got info on the files they loaded onto the server, and exactly how they got executed. Also had timestamps, etc.
0
 
LVL 70

Expert Comment

by:Merete
ID: 41892667
All comments have a solution
0

Featured Post

New benefit for Premium Members - Upgrade now!

Ready to get started with anonymous questions today? It's easy! Learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Load balancing is the method of dividing the total amount of work performed by one computer between two or more computers. Its aim is to get more work done in the same amount of time, ensuring that all the users get served faster.
For Sennheiser, comfort, quality and security are high priority areas. This paper addresses the security of Bluetooth technology and the supplementary security that Sennheiser’s Contact Center and Office (CC&O) headsets provide.  
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
Suggested Courses

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question