addressalign-toparrow-leftarrow-rightbackbellblockcalendarcameraccwcheckchevron-downchevron-leftchevron-rightchevron-small-downchevron-small-leftchevron-small-rightchevron-small-upchevron-upcircle-with-checkcircle-with-crosscircle-with-pluscontroller-playcredit-cardcrossdots-three-verticaleditemptyheartexporteye-with-lineeyefacebookfolderfullheartglobe--smallglobegmailgooglegroupshelp-with-circleimageimagesinstagramFill 1launch-new-window--smalllight-bulblinklocation-pinm-swarmSearchmailmessagesminusmoremuplabelShape 3 + Rectangle 1ShapeoutlookpersonJoin Group on CardStartprice-ribbonprintShapeShapeShapeShapeImported LayersImported LayersImported Layersshieldstartickettrashtriangle-downtriangle-uptwitteruserwarningyahoo

The Northeast Ohio ISSA Security Meetup Group Message Board › Process for Reporting Computer Crimes

Process for Reporting Computer Crimes

Mike S.
michaelstratton
Streetsboro, OH
Post #: 56
What process does anyone recommend when you have evidence and validation of an attack on a website? Quite obviously, local, state and federal authorities are part of the process. Unfortunately, I have found from my own experience that local and federal law enforcement usually do very little, if anything, to investigate and resolve any computer crime.



Suggestions, please?
Powered by mvnForum

People in this
Meetup are also in:

Sign up

Meetup members, Log in

By clicking "Sign up" or "Sign up using Facebook", you confirm that you accept our Terms of Service & Privacy Policy