사이버수사대 신고방법 How to report to cyber investigation department

These days, as the number of online crimes increases, there are more and more situations that require reporting to the cyber investigation department. There are countless different crimes taking place, from voice phishing financial fraud through KakaoTalk hacking to second-hand transaction fraud, online swearing, spreading false information, and defamation. This time, I would like to tell you how to report to the cyber investigation team when you have suffered damage from a cyber crime that seems unlikely to happen to you, as well as how to consult about cyber crimes over the phone. Please refer to the article below, it may be helpful.사이버수사대 신고

사이버수사대 신고

 

Types of Cyber ​​Crime
In fact, cybercrime is not all about direct financial damage. There are more types of cybercrime than you might think, and they can be broadly classified into three categories. It can be divided into information and communications network crimes, information and communications network use crimes, and illegal content crimes. You can’t quite tell what it is just by looking at the title, right? Then please read the contents below.

 

Types of Cyber ​​Crimes
Types of Cyber ​​Crimes

1. Information and communication network crimes
Cases that constitute information and communication network infringement crimes are as follows. This refers to cases where a person does not have legitimate access rights or is allowed to do so but breaks into a computer or information and communication network by exceeding the access rights. This also includes cases where data or programs are damaged or altered without permission, or when a failure occurs in another person’s system, such as a DDoS attack. These are the kinds of situations you usually see in spy movies. It refers to a crime of intentionally attacking another person’s computer or information and communication network itself. Let me give you an easy example.

 

Hacking account theft, simple intrusion, data leak, data damage
Denial of service attack (DDos) Sends a large number of signals and causes service network failure
Malicious programs that can damage, interfere with, alter or falsify systems or data.
Other information and communication network infringement-type crimes A new type of crime not classified above

 

2. Crimes using information and communication networks
This is a case where the information and communication network is used as a means of crime, and it corresponds to most cyber crimes that ordinary people suffer knowingly or unknowingly. I also recently got scammed by Jungjunara. This was an incident where I lost money after depositing the money, but fortunately, I transferred the money to Toss and found out about Toss’ program that compensates in such cases, so I received compensation. However, even though it has been 3 months since I reported it to the cyber investigation team, I am still being contacted that the investigation is ongoing.

 

Cyber ​​fraud Direct transaction fraud, shopping mall fraud, game fraud, and other cyber fraud
Cyber ​​financial crime – Phishing: Financial fraud by directing people to a fake site masquerading as a financial institution
– Pharming: Manipulating a PC infected with malware to move to a fake site even when accessing a financial site normally.
– Smishing: Installing malicious code through codes such as URLs in text messages, making small payments without your knowledge.
– Memory hacking: Plant malicious code on a PC and transfer it to the criminal’s account.
– Body cam phishing: Extort money by threatening to distribute the video after chatting with an obscene video
– Other telecommunication financial fraud: Types not applicable to the above
Infringement of personal location information A crime of infringing, stealing, or leaking another person’s personal information through a computer system.
Cyber ​​copyright infringement Infringes on the rights to digital works or computer program works through information and communication networks.
When sending advertising information about goods or services prohibited by cyber spam law
Other crimes using information and communication networks Crimes that do not fall into the above types

 

3. Illegal content crime
This is the type of cybercrime that usually appears in the news. It’s very vicious.

Cyber ​​sexual violence, distribution of illegal sexual videos, child sexual exploitation, and illegal filming
Cyber ​​gambling, sports Toto, horse racing, bicycle racing, motorboat racing, and other internet gambling
Cyber ​​defamation/insult, cyber stalking When defaming another person or publicly insulting someone
Other illegal content crimes not classified above
Cyber ​​spam mail, no display of media harmful to youth, provision for profit, advertisement of media harmful to youth, public exhibition

 

How to report to cyber investigation department

 

 

If you have suffered any of the damages listed above, you must first report it to prevent second or third victims. There are two ways to report to cyber crime: through the crime reporting system (PC and mobile) and directly to the police station’s civil affairs office and report. However, even if you make a cyber report, there may be cases where you must visit the police station in person depending on the case. If you report in detail online in advance, there may be cases where a visit is not necessary, so it is convenient to report in detail through the cyber investigation team first.

 

Report to cyber investigation team
Report to cyber investigation team

1. Visit the jurisdictional police station and report to the cyber investigation unit and time
In fact, if you find it inconvenient to file a report through a computer, it may be simpler and more convenient to report it in person at a nearby police station. Even if the police station does not have jurisdiction over your address, you can receive guidance by visiting the civil affairs office of a nearby police station. It is recommended that you visit between 9 a.m. and 6 p.m. on weekdays, if possible. The representative civil complaint number is 182.

We have supplies ready for your visit. The reporter must first have an identification card (resident registration card, driver’s license) to prove his or her identity. And you need data to prove that you have been a victim of cybercrime. At this time, you will need a bank transfer statement or a screen capture of the conversation. In fact, since it is a bit cumbersome to reprint these materials, it is more convenient to report cyber-related crimes online. If you visit the police station and inquire about the cyber investigation office, you can receive guidance and file a report.

 

Types of documents reported to cyber investigation unit
There are two ways to visit the police station and report it. There are two ways to submit a complaint and file a complaint. A ‘complaint’ is simply a procedure to express your intention to conduct an investigation because you have suffered such damage online. When writing a complaint, rather than having a set format, you can write the damage situation step by step in the complaint and damage statement according to the six-down rule. Relevant document forms can be obtained from the police station. Of course, you must also provide evidence.

Second, there is the filing of a complaint. The difference between a complaint is that it calls for an investigation into the damage, while a complaint is an expression of intent to punish in addition to the investigation. It is a foreign country that has legal effect. Therefore, the person being sued must be clearly specified and relevant evidence must also be prepared in detail. You may have seen articles saying that celebrities have captured all of their online profanity. In cases where the author is clear, such as cyber insults or cyber defamation, evidence may be captured and a complaint may be filed. The number of celebrities who take a firm stance that there will be no leniency is increasing. We will post additional information on the complaint form and how to write it.

 

 

2. Cybercrime Reporting System (ECRM)

 

 

The second method is to report to the cyber investigation team through the cyber crime reporting system directly operated by the National Police Agency. Since reporting on a PC and reporting on a mobile device appear slightly differently depending on the screen, we will cover both methods.

 

How to report to cyber investigation team through PC

Report to cyber investigation team
Report to cyber investigation team

Click the report button on the site linked above. And just go to that page. You can report by clicking on any of the three types of reporting, counseling, or reporting, but if you want to receive counseling before reporting, receiving counseling is also a good way to do so. In the case of online reporting, only the person who suffered the damage can do so. If the victim is unable to do so, a representative can do so, but please note that you must visit the police station in person to report it.

 

Report to cyber investigation team
Report to cyber investigation team

When you submit a report, you must first agree to the guidelines prohibiting false information and identity theft and to verify that you are 14 years or older. And there is an explanation of the procedure. When you click OK, consent buttons for collection items, retention period, etc. will appear. After reading it carefully, you can select whether you agree or disagree according to your preference. However, if you do not consent, you may not be able to report it online and may have to visit the police station in person.

 

Cyber ​​Investigation Unit Procedures
Cyber ​​Investigation Unit Procedures
Cyber ​​Investigation Unit Procedures

First, select the type of crime, attach evidence, enter personal information, and enter content to complete the process. There may or may not be a process of visiting the police station and investigating.

 

Commonly reported types of cybercrime

Typical types of cybercrime
Typical types of cybercrime

Here are some examples that are most commonly reported. Direct transaction fraud, cyber defamation, insult, digital sex crime, hacking, small payment, conditional meeting fraud, messenger phishing, body cam phishing, romance scam, internet investment fraud, cyber gambling, game fraud, etc. Select the case that suits you and proceed to the next step.

 

Typical types of cybercrime
Typical types of cybercrime

You will select a detailed type according to the type of crime.

 

Detailed type
Detailed type

The case of cyber fraud that I was involved in was the Joonggonara transaction. As expected, there are many related cases and the options for the case are quite detailed.

 

Checklist
Checklist

If you read the instructions before reporting, it says that if there are multiple victims and some of the victims have already visited the police station and made statements, the investigation can proceed without attending the police station. What is also important is that you must upload your ID and supporting documents.

 

proof of identity
proof of identity

As identification, you can use a resident card, driver’s license, alien registration card, passport, or resident registration certificate.

 

Attach evidence
Attach evidence

You must also submit your application in as much detail as possible, providing supporting materials such as transfer details, conversation history attachments, and other posts. After checking the explanation, click Report