Browse Definitions :
Definition

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center (IC3) is a website and that offers users a standardized mechanism and interface to report suspected cybercrime or other illegal activity facilitated by the Internet. Victims can report on their own behalf, and people can also report crimes on behalf of other individuals.

 The IC3 website offers interfaces for reporting internet crime to IC3, reporting terrorism or terrorism threats to the FBI and reporting child-related crime to the National Center for Missing and Exploited Children (NCMEC). In addition to complaint forms, the site includes a frequently-asked questions (FAQ) list, information about ongoing investigations, crime prevention tips and explanations of such crimes as identity theft, credit card fraud and phishing.

Here's the type of information requested on the complaint form:

  • Contact information for the victim.
  • Financial information, such as account data, recipient, account and transaction data (for crimes involving theft of money).
  • Website, name and contact information for the person who allegedly committed the crime, referred to as the “subject.”
  • Details of the crime.
  • Email headers.

The IC3 was created in 2000 by a task force including the  United States Federal Bureau of Investigation (FBI), the National White Collar Crime Center (NW3C) and the Bureau of Justice Assistance (BJA). Originally called the Internet Fraud Complaint Center (IFCC), the site was renamed in 2003 to better reflect the broad nature of internet-facilitated crime.

This was last updated in December 2016

Continue Reading About Internet Crime Complaint Center (IC3)

Networking
  • network interface card (NIC)

    A network interface card (NIC) is a hardware component, typically a circuit board or chip, installed on a computer so it can ...

  • User Datagram Protocol (UDP)

    User Datagram Protocol (UDP) is a communications protocol primarily used to establish low-latency and loss-tolerating connections...

  • Telnet

    Telnet is a network protocol used to virtually access a computer and provide a two-way, collaborative and text-based ...

Security
  • advanced persistent threat (APT)

    An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and ...

  • Mitre ATT&CK framework

    The Mitre ATT&CK (pronounced miter attack) framework is a free, globally accessible knowledge base that describes the latest ...

  • timing attack

    A timing attack is a type of side-channel attack that exploits the amount of time a computer process runs to gain knowledge about...

CIO
HRSoftware
  • employee resource group (ERG)

    An employee resource group is a workplace club or more formally realized affinity group organized around a shared interest or ...

  • employee training and development

    Employee training and development is a set of activities and programs designed to enhance the knowledge, skills and abilities of ...

  • employee sentiment analysis

    Employee sentiment analysis is the use of natural language processing and other AI techniques to automatically analyze employee ...

Customer Experience
  • customer profiling

    Customer profiling is the detailed and systematic process of constructing a clear portrait of a company's ideal customer by ...

  • customer insight (consumer insight)

    Customer insight, also known as consumer insight, is the understanding and interpretation of customer data, behaviors and ...

  • buyer persona

    A buyer persona is a composite representation of a specific type of customer in a market segment.

Close