Solved

what info is needed to have the cops research a cybercrime?

Posted on 2016-10-20
7
40 Views
Last Modified: 2016-11-18
I've been doing with the hacker and I'm trying to get them to stop. The only way I think it's going to happen is if I have their devices seized and at that point start a civil case against them.  I've been able to track IP addresses ,Mac addresses, Hostnames and other various pieces of information. What do I need to give the police in order for them to investigate the information further do they can get their exact geolocation?
Anyone have any advice?
0
Comment
Question by:Fulgencio Eres
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 29

Accepted Solution

by:
masnrock earned 250 total points (awarded by participants)
ID: 41851962
If you don't mind my asking, what is the crime in question? Depending on what it is, you're going to need to show evidence of the criminal accessing or stealing data, tampering with files, etc. Could also go as far as firewall and system logs.
0
 
LVL 34

Assisted Solution

by:Paul MacDonald
Paul MacDonald earned 125 total points (awarded by participants)
ID: 41852052
Yeah, first off, you're going to have to prove a crime was committed and/or that you suffered a loss of some sort.  Then it will likely become a matter of handing over all the evidence you have related to the crime.

Calling your local police, and then the FBI would probably be the best places to start.
0
 
LVL 70

Assisted Solution

by:Merete
Merete earned 125 total points (awarded by participants)
ID: 41854772
When you feel you have been hacked
The most important thing you should do is change your passwords. Alert you email friends and increase your security protection. Insure your system is up to date. Run windows defender scan.
You have not told us why you believe you're being hacked? What are your suspicions based on.
You may not be actually hacked.
Do you have any Peer to Peer software installed for downloading files? Like Napster or Bittorrent?
If you have then it's possible once you have completed your download unless it's closed  immediately ( leeching) it will begin uploading
How BitTorrent Works
http://computer.howstuffworks.com/bittorrent1.htm

Have a look at Spotting the Signs of a Possible Hacking
http://www.wikihow.com/Know-if-You've-Been-Hacked
You also asking about this here might be a good idea to keep the question in one
https://www.experts-exchange.com/questions/28977835/what-connections-should-be-in-my-network-connection-logs.html
0
Visualize your virtual and backup environments

Create well-organized and polished visualizations of your virtual and backup environments when planning VMware vSphere, Microsoft Hyper-V or Veeam deployments. It helps you to gain better visibility and valuable business insights.

 
LVL 29

Expert Comment

by:masnrock
ID: 41855193
Another key thing is to make a forensic image with a tool like EnCase or Redline so that there is something to analyze. And do NOT turn off the system before you do so (taking it offline is acceptable).
0
 

Author Comment

by:Fulgencio Eres
ID: 41865589
and that forensic file can tell me what exactly?
0
 
LVL 29

Assisted Solution

by:masnrock
masnrock earned 250 total points (awarded by participants)
ID: 41865681
You can use the forensic file to trace when and how strange events occurred. For example, I dealt with an office that got their entire NAS drive share encrypted. Turned out that it was done from a server that had RDP port open, and hackers were able to brute force their way into an account. I also got info on the files they loaded onto the server, and exactly how they got executed. Also had timestamps, etc.
0
 
LVL 70

Expert Comment

by:Merete
ID: 41892667
All comments have a solution
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let Bitmoji into your life. Now is the time to learn a new language of smartphone messaging with this brief introduction.
DECT technology has become a popular standard for wireless voice communication. DECT devices are not likely to be affected by other electronic devices and signals because they operate in a separate frequency-band.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Suggested Courses

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question