You may file a complaint with the Federal Bureau of Investigation’s Internet Crime Complaint Center, also known as the IC3, if you believe you have been the victim of an Internet crime or if you want to file on behalf of another person you believe has been such a victim.
Internet crime includes any illegal activity involving one or more components of the Internet, such as websites, chat rooms, and/or email. Internet crime involves the use of the Internet to communicate false or fraudulent representations to consumers. These crimes may include, but are not limited to, advance-fee schemes, non-delivery of goods or services, computer hacking, or employment/business opportunity schemes.
If either the victim or the alleged subject of the Internet crime is located within the United States, you may file a complaint with the IC3.
Trained analysts at the IC3 review and research the complaints, disseminating information to the appropriate federal, state, local, or international law enforcement or regulatory agencies for criminal, civil, or administrative action, as appropriate.
IC3 does not collect evidence regarding complaints. While you may cut and paste information into your complaint (e.g., email headers), you must be sure to keep all original documents in a secure location. In the event that a law enforcement or regulatory agency opens an investigation, they may request the information directly from you.
It is important that you keep any evidence you may have related to your complaint. Evidence may include, but is not limited to, the following:
- Canceled checks
- Credit card receipts
- Money order receipts
- Certified or other mail receipts
- Wire receipts
- Virtual currency receipts
- Pre-paid card receipts
- Envelopes (if you received items via FedEx, UPS, or U.S. Mail)
- Pamphlets or brochures
- Phone bills
- Printed or preferably electronic copies of emails (if printed, include full email header information)
- Printed or preferably electronic copies of web pages
- Hard drive images
- PCAP files containing malicious network traffic
- Network, host system, and/or security appliance logs
- Copies of malware
- Chat transcripts and/or telephony logs
Keep items in a safe location in the event you are requested to provide them for investigative or prosecutive evidence.