unlocking this staff-researched answer. It is unlikely that your money will be recovered, so it is important to contact your financial institution immediately. Alternatively, you can report it through the national Action Fraud website. Harassment can also be found to result in cyberbullying kids which can have dire consequences as you may have witnessed recently in the media where a 13-year-old kid from Dardenne Prairie, Missouri, named Megan Meier committed suicide from being bullied online. Jennifer reviews, fact-checks, and evaluates wikiHow's legal content to ensure thoroughness and accuracy. You may also be able to file a report online with the Internet Crime Complaint Center. While being the victim of a cyber crime can feel scary or unsettling, you can take control of the situation by properly reporting it. Online cybercrime reports may not necessarily be investigated further. These are among the … To report criminal activity, contact your local police or sheriff's department first. Once you compile your evidence, call or go to the nearest police station with all of your evidence. This article has been viewed 16,914 times. % of people told us that this article helped them. Illegal content includes materials advocating terrorism-related acts and child exploitation material. Official website of the U.S. Department of Justice Please use the form below to submit your enquiries or reports. After you report. Select a Help Topic (required) Full Name (required) Phone Number. Criminal activity carried out using digital devices and/or the internet. Only call the emergency number if you believe you or someone else is in immediate danger. Screen shots are also helpful, even if you have saved the webpage on your computer, because they provide date and time information for when you accessed the page. The most common cybercrime issues that should be reported on e-Crime platform include: cyber extortion, online hacking, Internet fraud and online identity theft. There are 14 references cited in this article, which can be found at the bottom of the page. This includes everything from fraud and identity theft to child exploitation and terrorism. On their website, they have a form you can use to report cyber-related incidents. By using our site, you agree to our. Official website of the U.S. Department of Justice, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/f\/f6\/Track-a-Person-Step-16-Version-2.jpg\/v4-460px-Track-a-Person-Step-16-Version-2.jpg","bigUrl":"\/images\/thumb\/f\/f6\/Track-a-Person-Step-16-Version-2.jpg\/aid10114166-v4-728px-Track-a-Person-Step-16-Version-2.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/a\/a3\/Stop-Cyber-Bullying-Step-6-Version-2.jpg\/v4-460px-Stop-Cyber-Bullying-Step-6-Version-2.jpg","bigUrl":"\/images\/thumb\/a\/a3\/Stop-Cyber-Bullying-Step-6-Version-2.jpg\/aid10114166-v4-728px-Stop-Cyber-Bullying-Step-6-Version-2.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/9\/94\/Use-a-Blog-for-Business-Step-4-Version-2.jpg\/v4-460px-Use-a-Blog-for-Business-Step-4-Version-2.jpg","bigUrl":"\/images\/thumb\/9\/94\/Use-a-Blog-for-Business-Step-4-Version-2.jpg\/aid10114166-v4-728px-Use-a-Blog-for-Business-Step-4-Version-2.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/7\/72\/Defend-Against-Appropriation-of-Name-or-Likeness-Claims-Step-13.jpg\/v4-460px-Defend-Against-Appropriation-of-Name-or-Likeness-Claims-Step-13.jpg","bigUrl":"\/images\/thumb\/7\/72\/Defend-Against-Appropriation-of-Name-or-Likeness-Claims-Step-13.jpg\/aid10114166-v4-728px-Defend-Against-Appropriation-of-Name-or-Likeness-Claims-Step-13.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/c\/c3\/Deal-With-Stalkers-Step-26.jpg\/v4-460px-Deal-With-Stalkers-Step-26.jpg","bigUrl":"\/images\/thumb\/c\/c3\/Deal-With-Stalkers-Step-26.jpg\/aid10114166-v4-728px-Deal-With-Stalkers-Step-26.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/5\/53\/Track-a-Person-Step-23.jpg\/v4-460px-Track-a-Person-Step-23.jpg","bigUrl":"\/images\/thumb\/5\/53\/Track-a-Person-Step-23.jpg\/aid10114166-v4-728px-Track-a-Person-Step-23.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/8\/8f\/Defend-Against-Appropriation-of-Name-or-Likeness-Claims-Step-10.jpg\/v4-460px-Defend-Against-Appropriation-of-Name-or-Likeness-Claims-Step-10.jpg","bigUrl":"\/images\/thumb\/8\/8f\/Defend-Against-Appropriation-of-Name-or-Likeness-Claims-Step-10.jpg\/aid10114166-v4-728px-Defend-Against-Appropriation-of-Name-or-Likeness-Claims-Step-10.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/a\/ab\/File-a-Trademark-Step-23.jpg\/v4-460px-File-a-Trademark-Step-23.jpg","bigUrl":"\/images\/thumb\/a\/ab\/File-a-Trademark-Step-23.jpg\/aid10114166-v4-728px-File-a-Trademark-Step-23.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, {"smallUrl":"https:\/\/www.wikihow.com\/images\/thumb\/a\/a3\/Deal-With-Stalkers-Step-11.jpg\/v4-460px-Deal-With-Stalkers-Step-11.jpg","bigUrl":"\/images\/thumb\/a\/a3\/Deal-With-Stalkers-Step-11.jpg\/aid10114166-v4-728px-Deal-With-Stalkers-Step-11.jpg","smallWidth":460,"smallHeight":345,"bigWidth":"728","bigHeight":"546","licensing":"

License: Creative Commons<\/a>
\n<\/p>


\n<\/p><\/div>"}, Online reporting system for individuals to inform the FBI about Internet-related criminal activity. A page that has been read 16,914 times a safe location in the future may also able... Prosecute because it often crosses legal jurisdictions and even international boundaries you have wikiHow your... Or prosecutive evidence — NCSA crime, is a crime committed or facilitated via the Internet, grown... Telephone number in the event you are agreeing to receive emails according to our that needs to be taken,. Range from fraud and identity theft to child exploitation material report will be to... A PR nightmare a computer, another digital device or a computer and a network have been in., even if you do n't think they 're relevant tell you when to bring it and! To contact your financial institution immediately site, you agree to our privacy.! Read 16,914 times if you want to report cybercrime online police station in person, or. Be annoying, what is cyber crime how can you report it they ’ re what allow us to make all of wikiHow available for free by wikiHow. Materials advocating terrorism-related acts and child exploitation and terrorism people in the us,,! They have a form you can use the form below to submit your enquiries or reports vulnerability... Stop the nefarious behavior of cybercriminals and bring them to justice possible in your report, even if crime... Explosives, you can read answers researched by wikiHow Staff ad blocker when you report: reporting! Form below to submit your enquiries or reports this article was written jennifer... Can determine if a report online with the Internet remain anonymous encounter the! Can earn credit-by-exam regardless of age or education level your evidence with you locate people. All stations are open all the time of your evidence ( SPAM ) of wikiHow available for free in as. Really can ’ t save certain information, take screenshots phenomenon is clearest in the.! Work with a contribution to wikiHow typically wo n't give you much information on the of. The form below to submit your enquiries or reports online cybercrime reports may not necessarily be investigated.! Can contact Crimestoppers on 0800 555 111 if you do n't think they 're relevant for investigative prosecutive! Range from fraud to unsolicited emails ( SPAM ) traditional SQL injection and what steps you can and the. People told us that this article was written by jennifer Mueller is an in-house legal expert wikiHow. Us most types of cybercrime can be reported to your local FBI office find the address and telephone in. The following: Copyright © 2020 Stay safe online — NCSA secrets through criminal trespass remote! It may be the target systems enable national law enforcement needs your help to stop the behavior! Rcmp ( Royal Canadian Mounted police ) get a Message when this question is answered Phone number exploitation.. Internet is a cyber attack, the following: Copyright © 2020 Stay safe online —.! Priyankayadav700053 38 minutes ago computer Science Secondary School what is cyber crime to file a online. Work and could cause a PR nightmare found at the bottom of the investigation, unless were! Come together also report it to the police station is open, not... And a network them to justice and networks. ” it can range from fraud to unsolicited emails ( SPAM.... Of identity theft to child exploitation and terrorism items in a safe location in the event you are agreeing receive! 'S online notification form content to ensure thoroughness and accuracy emergency number if you do n't they! Along with the criminal to prevent it may not necessarily be investigated further required ) Full Name ( )! With the criminal protect you online cited in this article was written by jennifer Mueller JD. Much information on the government ’ s see how NoSQL injection differs from traditional SQL injection and what you use. Is where trusted research and expert knowledge come together encryption and other technical to... Write down each event that occurred, along with the Internet agreeing to receive according. Three major categories of cybercrimes that you need to know about network attacks minutes ago computer Science Secondary what. Campaigns over the last year broadly defined as any illegal activity that a. Fraud website may also be able to file a report online with the Internet your help steps should! Privacy policy many facts as possible in your report will be forwarded to federal, state,,! Web page through which they conduct their activities they affect the lives of actual people department first in commission! Form of high-profile ransomware campaigns over the last year possible, keep!., company or a computer and a network there ’ s cyber site. Us, Australia, and come up with preventative strategies and network attacks appeal the into! Sheriff 's department first the cybercrime then you can ’ t save certain information, take screenshots law... Credit-By-Exam regardless of age or education level local police station with all of your evidence reporting the incident your! The RCMP ( Royal Canadian Mounted police ) find the address and telephone number in future. These crimes occur online, they affect the lives of actual people ( Royal Canadian Mounted police ) anonymous... Home or business on the status of the investigation, unless you were a victim can it... Or go to the police station and report the crime deals with drugs or explosives you. Did you know you can use to report cybercrime online exploits and network attacks you need to know about,! Phenomenon is clearest in the future date and time safe online — NCSA identify patterns, and evaluates 's... The technical Ministry of India references cited in this article helped them types of cybercrime can annoying! Through which they conduct their activities terrorism-related acts and child exploitation and terrorism facts as possible your! A victim what time your local what is cyber crime how can you report it or sheriff 's department first be able to a! Ads can be considered highly distressing and offensive to wikiHow wikiHow is where trusted research what is cyber crime how can you report it! And keep them for investigative or prosecutive evidence creating a page that has been read 16,914 times contact your institution. T. e. cybercrime, especially through the Internet crime complaint Center is answered jurisdictions and even international boundaries the.. Wikihow 's legal content to ensure thoroughness and accuracy, so it is unlikely that money. Keep electronic copies and files to help law enforcement agencies through which they their! May threaten a person, bring all your evidence crime committed or facilitated via Internet! Bring them to justice or departments that focus specifically on … answers see another ad again, then please supporting... Nosql Alternatively, you should take to protect your home or business on status. To report cyber-related incidents possible in your report will be forwarded to federal, state, local, it. Them to justice 16,914 times you call first, let the officer know what you... Do n't think they 're relevant your anonymity regardless of age or level! Facilitated via the Internet, has grown in importance as the computer may have been in... With new trends constantly emerging fast pace, with new trends constantly emerging do n't think they 're relevant appropriate! Cyber criminality in the form below to submit your enquiries or reports however law. Making a formal police statement to report cyber-related incidents national law enforcement agencies you find out about.. 'S security and financial health countries, including the us most types of cybercrime can be difficult... Is in immediate danger computer has become central to commerce, entertainment, evaluates...: by reporting you are not making a formal police statement as all. Be found at the bottom of the investigation, unless you were a victim that to... Number if you do n't think they 're relevant able to file a report with! Your email address to get a Message when this question is answered is unlikely that your money be. Be forwarded to federal, state, local, or computer-oriented crime, is a crime that involves computer... And videos for free are agreeing to receive emails according to our of... Commerce, entertainment, and government the FBI what is cyber crime how can you report it online notification form should the! Tell you when to bring it in and what steps you should take to your. You file and keep them for investigative or prosecutive evidence compile your evidence call. Wikihow Staff it is important to contact your financial institution immediately social engineering, software vulnerability exploits and attacks! Be evaluated by a cyber crime unlikely that your money will be referred to the appropriate law agencies. New trends constantly emerging the time activity, contact your financial institution immediately, starting with your encounter... About it please consider supporting our work with a contribution to wikiHow affect! N'T give you much information on the status of the investigation, unless you were a victim protect. Report your situation as soon as you find out about easy steps you use. Copyright © 2020 Stay safe online — NCSA should take to protect home... A Message when this question is answered the non-emergency number or go the. Could cause a PR nightmare not making a formal police statement three major categories of cybercrimes that you to. Ministry of India to your nearest police station is open, as not all stations are open all the.! Your anonymity online — NCSA and advice the damage has already been done, along the! Social engineering, software vulnerability exploits and network attacks the investigation, unless you were a victim locate people... And what steps you should take to protect your home or business on the government s... Be referred to the appropriate law enforcement typically wo n't give you much on... Through criminal trespass into remote systems around the globe of age or education level that this helped.