{"id":8930,"date":"2025-02-12T14:54:34","date_gmt":"2025-02-12T14:54:34","guid":{"rendered":"https:\/\/www.digitalforensics.com\/blog\/?p=8930"},"modified":"2025-06-02T18:31:08","modified_gmt":"2025-06-02T18:31:08","slug":"report-cybercrime-to-the-fbi","status":"publish","type":"post","link":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/","title":{"rendered":"FBI IC3 Reporting Guide: How to Report Cybercrime to the FBI"},"content":{"rendered":"\n<p>Cybercrimes are growing at a rapid pace, targeting businesses and governments worldwide. Automation and generative artificial intelligence (AI) have transformed cyberattacks, including extortion, sextortion, and <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/malware-prevention\/\">malware<\/a>, making them highly profitable for attackers.<\/p>\n\n\n\n<p><a href=\"https:\/\/sg.usembassy.gov\/virtual-press-briefing-with-scott-schelble-deputy-assistant-director-of-the-federal-bureau-of-investigation-on-the-fbis-efforts-to-counter-scam-centers-in-southeast-asia\/\" target=\"_blank\" rel=\"noreferrer noopener\">According to Scott Schelble<\/a>, Deputy Director of the Federal Bureau of Investigation (FBI), the FBI\u2019s Internet Crime Complaint Center (IC3) received more than 80,000 complaints in 2025, with reported losses totaling $2.9 billion.<\/p>\n\n\n\n<p>To combat these attacks, the FBI provides resources for <a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/report-cybercrime-private-investigator\/\">reporting cybercriminals<\/a>. This guide will walk you through what cybercrimes the FBI handles, how to collect and preserve electronic evidence, the steps to file a report to the IC3, and the state of cybercrimes in today\u2019s digital world.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-services-does-the-ic3-provide-for-cybercrime-victims\"><span class=\"ez-toc-section\" id=\"What_Services_Does_the_IC3_Provide_for_Cybercrime_Victims\"><\/span>What Services Does the IC3 Provide for Cybercrime Victims?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The IC3 serves as a centralized platform for reporting internet-based crimes. While the center itself does not investigate individual complaints, it provides the following services:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Complaint Submission<\/strong>: Victims can submit a detailed report of the crime through the IC3\u2019s online complaint form. This information is shared with relevant law enforcement agencies for investigation.<br><\/li>\n\n\n\n<li><strong>Data Analysis<\/strong>: The IC3 analyzes trends and patterns in cybercrime to support broader FBI investigations and public awareness campaigns.<br><\/li>\n\n\n\n<li><strong>Resource Guidance<\/strong>: The IC3\u2019s website provides resources for victims, including steps to mitigate the impact of the crime, such as freezing credit reports or strengthening cybersecurity measures.<br><\/li>\n\n\n\n<li><strong>Collaboration with Other Agencies<\/strong>: The IC3 works with various agencies, including federal, state, and local law enforcement partners, to address cybercrime effectively.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-steps-to-file-a-cybercrime-report-with-the-fbi-s-ic3\"><span class=\"ez-toc-section\" id=\"Steps_to_File_a_Cybercrime_Report_with_the_FBIs_IC3\"><\/span>Steps to File a Cybercrime Report with the FBI\u2019s IC3<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-emergency-complaint\"><span class=\"ez-toc-section\" id=\"Emergency_Complaint\"><\/span>Emergency Complaint<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>In some circumstances, you may need immediate help. If so, dial 911 for quick help. You can also call your local police to deal with imminent danger.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-routine-complaint\"><span class=\"ez-toc-section\" id=\"Routine_Complaint\"><\/span>Routine Complaint<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<div id=\"cybercrime-report-fbi-ic3\">\n\n\n\n<p>To report cybercrime and <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/what-to-do-if-you-are-being-extorted-online\/\">online extortion<\/a> to the IC3, follow these steps:<\/p>\n\n\n\n<p><strong>1. Visit the IC3 Website<\/strong>:\u202fGo to\u202f<a href=\"https:\/\/www.ic3.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">www.ic3.gov<\/a>\u202fand select the option to file a complaint.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"858\" height=\"246\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/file_a_complaint_ic3.jpg\" alt=\"IC3 \u201cFile a Complaint\u201d Page\" class=\"wp-image-14993\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/file_a_complaint_ic3.jpg 858w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/file_a_complaint_ic3-300x86.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/file_a_complaint_ic3-768x220.jpg 768w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/file_a_complaint_ic3-512x147.jpg 512w\" sizes=\"auto, (max-width: 858px) 100vw, 858px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 1: IC3 \u201cFile a Complaint\u201d Page<\/p>\n\n\n\n<p>Once you click the \u201cFile A Complaint\u201d button, a new pop-up window appears asking you to either accept or decline the terms of service.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"509\" height=\"719\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/terms_and_conditions_ic3.jpg\" alt=\"IC3 Terms and Conditions\" class=\"wp-image-14992\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/terms_and_conditions_ic3.jpg 509w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/terms_and_conditions_ic3-212x300.jpg 212w\" sizes=\"auto, (max-width: 509px) 100vw, 509px\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-left\">Figure 2: IC3 Terms and Conditions<\/p>\n\n\n\n<p><strong>2. Fill Out the Form<\/strong>:\u202fOnce you accept the terms of service, you will be redirected to the IC3 complaint form page. The form will ask you to go through seven steps, which include:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Who is Filing this Complaint?<\/li>\n\n\n\n<li>Complainant Information<\/li>\n\n\n\n<li>Financial Transaction(s)<\/li>\n\n\n\n<li>Information About the Subject(s)<\/li>\n\n\n\n<li>Description of Incident<\/li>\n\n\n\n<li>Other Information<\/li>\n\n\n\n<li>Privacy &amp; Signature<\/li>\n<\/ol>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"709\" height=\"189\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/ic3_process.jpg\" alt=\"IC3 7-Step Process to File a Complaint\" class=\"wp-image-14991\" style=\"aspect-ratio:3.7515502273666805;width:710px;height:auto\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/ic3_process.jpg 709w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/ic3_process-300x80.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/ic3_process-512x136.jpg 512w\" sizes=\"auto, (max-width: 709px) 100vw, 709px\" \/><\/figure>\n\n\n\n<p>Figure 3: IC3 7-Step Process to File a Complaint<\/p>\n\n\n\n<p>It is important to note that IC3 does not typically require the complainant to provide Personally Identifiable Information (PII), such as Social Security numbers.<\/p>\n\n\n\n<p><strong>3. Follow Up<\/strong>:\u202fWhile you may not receive individual updates, you can track trends and news through IC3\u2019s public reports.\u202f<\/p>\n\n\n\n<\/div>\n\n\n\n<figure>\n  <picture>\n    <!-- Mobile image -->\n    <source \n      srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/01\/What_Services_the_IC3_Provides_for_Cybercrime_Victims-1-1-scaled.jpg\"\n      media=\"(max-width: 767px)\"\n    >\n\n    <!-- Desktop fallback (required) -->\n    <img decoding=\"async\" \n      src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/01\/What_Services_the_IC3_Provides_for_Cybercrime_Victims-scaled.jpg\"\n      alt=\"What Services the IC3 Provides for Cybercrime Victims - Infographics\"\n      style=\"width:100%; height:auto;\"\n    >\n  <\/picture>\n<\/figure>\n\n\n\n<p>Figure 4: Digital Forensics Corp. Complaint Filing Guidance&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-happens-after-you-file-a-cybercrime-report-with-the-fbi-s-ic3\"><span class=\"ez-toc-section\" id=\"What_Happens_After_You_File_a_Cybercrime_Report_with_the_FBIs_IC3\"><\/span>What Happens After You File a Cybercrime Report with the FBI\u2019s IC3<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Once you have filed a complaint, an FBI-trained analyst will review and research your complaint. They will disseminate information to law enforcement and relevant partner agencies.<\/p>\n\n\n\n<p>It\u2019s important to note that the IC3 doesn\u2019t directly investigate cybercrimes. Instead, the report is filed and forwarded to the appropriate agencies, who will investigate and prosecute the responsible parties when possible. After submitting the complaint, you will receive the following official message from the FBI.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"681\" height=\"248\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/IC3-Official-Message-After-Submitting-a-Complaint.jpg\" alt=\"IC3 Official Message After Submitting a Complaint\" class=\"wp-image-14999\" srcset=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/IC3-Official-Message-After-Submitting-a-Complaint.jpg 681w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/IC3-Official-Message-After-Submitting-a-Complaint-300x109.jpg 300w, https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/IC3-Official-Message-After-Submitting-a-Complaint-512x186.jpg 512w\" sizes=\"auto, (max-width: 681px) 100vw, 681px\" \/><\/figure>\n\n\n\n<p>Figure 5: IC3 Official Message After Submitting a Complaint<\/p>\n\n\n\n<p>The experts at Digital Forensics Corp. can assist you with follow-up plans, documentation, and communication with authorities. In this situation, you are not alone. Our company can assist your efforts to take back control and recover your data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-what-cybercrimes-does-the-ic3-handle\"><span class=\"ez-toc-section\" id=\"What_Cybercrimes_Does_the_IC3_Handle\"><\/span>What Cybercrimes Does the IC3 Handle?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The FBI\u2019s Internet Crime Complaint Center (IC3) is designed to process reports of cybercrimes affecting individuals and businesses in the United States. They deal with a wide range of cybercrimes, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Phishing<\/strong><br><a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/phishing-attack-repsonse\/\">Phishing<\/a> is a fraudulent attempt to obtain sensitive information by masquerading as a trustworthy entity. Today\u2019s scammers leverage AI to create highly convincing phishing campaigns. <br>They may request documents, credentials, or urgent payments. In other cases, malware-infested links are disguised as routine messages. Once access is gained, attackers leverage stolen information for extortion.<\/li>\n\n\n\n<li><strong><a href=\"https:\/\/www.digitalforensics.com\/cyber-security\/online-identity-theft\">Identity Theft<\/a><\/strong><br>Identity theft is the act of someone using another person\u2019s PII to commit fraud or other crimes. Common forms of identity theft include:<ul><li><strong>Medical identity theft<\/strong>. Using someone else&#8217;s insurance to make false medical claims.<\/li><li><strong>Tax identity theft<\/strong>. Submitting fraudulent tax returns in someone else\u2019s name to claim refunds.<\/li><li><strong>Financial identity theft<\/strong>. Gaining unauthorized access to financial data to compromise existing accounts or open new ones.<\/li><\/ul><\/li>\n\n\n\n<li><strong>Sextortion<\/strong><br><a href=\"https:\/\/www.fbi.gov\/how-we-can-help-you\/scams-and-safety\/common-frauds-and-scams\/sextortion\" target=\"_blank\" rel=\"noreferrer noopener\">According to the FBI<\/a>, sextortion crimes involve threatening and coercing teens and children into sending explicit images and videos online. Sextortion can begin on any website, app, or game. That is why <strong>extortion reporting<\/strong> is essential.<br>Sextortionists can be ruthless, and their\u202f<strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/sextortion-online\/different-types-of-sextortion\/\">sextortion schemes<\/a><\/strong>\u202fare always changing as they adapt their tactics. AI technology has enabled sextortion attempts even in cases where no intimate content was shared. No matter their angle, their goal is to make you believe you have no option but to pay.<\/li>\n\n\n\n<li><strong>Ransomware<\/strong><br><a href=\"https:\/\/www.digitalforensics.com\/cyber-security\/ransomware-attack\">Ransomware<\/a> remains one of the highest-loss categories reported to the IC3. It\u2019s a malicious cryptography attack in which threat actors encrypt essential files on the victim\u2019s device. They demand payment for decryption and threaten to permanently delete or publicly release the data if they aren\u2019t met with compliance.<\/li>\n\n\n\n<li><strong>Business Email Compromise (BEC)<\/strong><br>BEC scams are a form of fraud where threat actors impersonate trusted leaders to trick employees into disclosing corporate data or sending money. These attacks can result in millions of dollars in losses. Common types of BEC scams include attorney impersonation, account compromise, and CEO fraud.<\/li>\n\n\n\n<li><strong>Distributed Denial of Service Extortion<\/strong><br>A distributed denial-of-service (DDoS) attack occurs when a malicious actor floods a server or network with traffic, preventing normal access. Some criminals use this pressure tactic to combine disruption with payment demands. They threaten prolonged downtime of the system or data if a ransom is not paid.<\/li>\n\n\n\n<li><strong>Data Breach Extortion<\/strong><br>A\u202f<strong><a href=\"https:\/\/www.digitalforensics.com\/blog\/software\/data-breach\/\">data breach<\/a>\u202f<\/strong>involves unauthorized access to confidential or protected information. Insider threats and external attacks are the primary causes. Insider threats are employees who may misuse their access to harm the company, while external parties carry out network attacks.<br>In breach-based extortion, criminals often threaten to release stolen customer data or misuse corporate secrets. They demand payment in exchange for not following through on their threats.<\/li>\n\n\n\n<li><strong>Social Engineering: The Art of Deception<\/strong><br>Internet criminals aren\u2019t always easy to identify. Sometimes they use sophisticated tactics to impersonate others or gain your trust. This is otherwise known as\u202f<a href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/social-engineering\/\">social engineering<\/a>. Instead of using highly technical skills to hack into a network, scammers use social engineering to trick users into letting them in.<br>Hackers can also take over an employee&#8217;s or trusted individual&#8217;s account to trick co-workers into sharing sensitive information. It\u2019s important to keep your guard up in every interaction online. Be cautious of all links and take your time when reading or responding to messages.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"When_Should_You_Report_to_Another_Agency\"><\/span>When Should You Report to Another Agency?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>While the IC3 handles a wide range of cybercrimes, certain situations may require you to report to a specialized agency. Below are examples of incidents and the agencies that handle them:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>Crimes Involving Children<\/strong>: If the crime involves child exploitation, such as the distribution of child pornography or online grooming, it should be reported to the&nbsp;<strong>National Center for Missing &amp; Exploited Children (NCMEC)<\/strong>&nbsp;through their CyberTipline at&nbsp;<a href=\"https:\/\/www.missingkids.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">www.missingkids.org<\/a>.<\/li>\n\n\n\n<li><strong>Financial Crimes<\/strong>: For scams involving investment fraud or other complex financial crimes, consider reporting to the&nbsp;<strong>Securities and Exchange Commission (SEC)<\/strong>&nbsp;or the&nbsp;<strong>Federal Trade Commission (FTC)<\/strong>&nbsp;in addition to the IC3.<\/li>\n\n\n\n<li><strong>Local Matters<\/strong>: For crimes that appear to be localized, such as&nbsp;<a href=\"https:\/\/www.digitalforensics.com\/blog\/harassment\/how-to-stop-someone-from-harassing-you-legally\/\">harassment<\/a>&nbsp;or&nbsp;<a href=\"https:\/\/www.digitalforensics.com\/blog\/harassment\/revenge-porn\/\">revenge porn<\/a>&nbsp;from someone known to you or small-scale fraud, you might want to contact your local police department first. They can coordinate with the FBI if necessary.<\/li>\n\n\n\n<li><strong>Health-Related Scams<\/strong>: If a cybercrime involves fraudulent medical services or the illegal sale of medications, report it to the&nbsp;<strong>U.S. Food and Drug Administration (FDA)<\/strong>&nbsp;or&nbsp;<strong>Medicare\u2019s Fraud Hotline<\/strong>.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-next-steps-for-cybercrime-victims-after-filing-an-ic3-report\"><span class=\"ez-toc-section\" id=\"Next_Steps_for_cybercrime_Victims_After_Filing_an_IC3_Report\"><\/span>Next Steps for cybercrime Victims After Filing an IC3 Report<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Reporting cybercriminals is a critical step in combating online threats and protecting yourself and others from future harm. The IC3 serves as a valuable resource for addressing a variety of internet-based crimes, but&nbsp;knowing when to <a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/top-resources-for-victims-of-online-blackmail\/\">report blackmail online<\/a> to specialized agencies can ensure your complaint is directed to the appropriate authorities. If you\u2019re facing threats and looking to file a Cybercrime report, the IC3 is often the best place to start.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.digitalforensics.com\/blog\/online-blackmail\/what-to-do-if-you-are-being-extorted-online\/\">If you are a victim of extortion<\/a> or cybercrime, experts at Digital Forensics Corp. are available 24\/7 to assist you. We provide many services to investigate the cybercrime using state-of-the-art technology. You can use our investigation to file a report with law enforcement, and we also have legal professionals that can provide support or direct you to an attorney that can help you seek justice. For immediate assistance with any cybercrime, contact Digital Forensic Corp. today!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Common_Cybercrime_Cases_We_Investigate\"><\/span>Common Cybercrime Cases We Investigate<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Digital Forensics Corp. deals with a broad spectrum of threat landscapes. If you have fallen prey to a cyberattack or a data breach, our highly skilled forensic investigators and cybersecurity professionals can help you get out of this nightmare.<\/p>\n\n\n\n<p>Our team effectively deals with cyber extortion, including sextortion and image-based blackmail, BEC, ransomware, phishing, and identity theft. Our team uses advanced techniques, such as our proprietary IP-to-location technology, to gather evidence and provide an expert cybercrime report.<\/p>\n\n\n\n<p>You can use our investigation to file a report with law enforcement, and we also have legal professionals who can provide support or direct you to an attorney who can help you seek justice. For immediate assistance with any cybercrime, <a href=\"https:\/\/www.digitalforensics.com\/contact-us\">contact<\/a> Digital Forensics Corp. today.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-faqs\"><span class=\"ez-toc-section\" id=\"FAQs\"><\/span>FAQs<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1776140589873\"><strong class=\"schema-faq-question\">How do I report cybercrime to the FBI or IC3?<\/strong> <p class=\"schema-faq-answer\">You can dial 911 in an emergency and file a complaint with the IC3. In the latter scenario, you will have to file a report through their online portal or contact your local field office.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776140603021\"><strong class=\"schema-faq-question\">What should I include in a cybercrime report?<\/strong> <p class=\"schema-faq-answer\">The IC3 requires the complainant\u2019s information, including name, address, telephone, and email address. You will also provide details of financial loss and transaction information.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776140619037\"><strong class=\"schema-faq-question\">What happens after I report cyber extortion to FBI?<\/strong> <p class=\"schema-faq-answer\">The IC3 assigns your report to the receiving agency, which\u00a0may\u00a0further investigate\u00a0the case\u00a0and let you know its status.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1776140633309\"><strong class=\"schema-faq-question\">Can Digital Forensics Corp. help after I file my report to FBI?<\/strong> <p class=\"schema-faq-answer\">Yes, Digital Forensics Corp. can certainly help you with follow-up plans, documentation, and communication with authorities.<\/p> <\/div> <\/div>\n\n\n\n<script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@graph\": [\n    {\n      \"@type\": \"WebPage\",\n      \"@id\": \"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#webpage\",\n      \"url\": \"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/\",\n      \"name\": \"How to Report Cybercrime to the FBI\u2019s IC3\",\n      \"description\": \"Learn how to report a cybercrime & extortion to the FBI's IC3. Understand what to report, how to gather evidence, and when to contact other agencies.\",\n      \"speakable\": {\n        \"@type\": \"SpeakableSpecification\",\n        \"cssSelector\": [\n          \"#cybercrime-report-fbi-ic3\"\n        ]\n      }\n    },\n    {\n      \"@type\": \"HowTo\",\n      \"name\": \"Steps to File a Cybercrime Report with the FBI\u2019s IC3\",\n      \"description\": \"A guide on how to navigate the IC3 website and successfully submit a routine cybercrime or online extortion complaint.\",\n      \"@id\": \"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#cybercrime-report-fbi-ic3\",\n      \"url\": \"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#cybercrime-report-fbi-ic3\",\n      \"step\": [\n        {\n          \"@type\": \"HowToStep\",\n          \"name\": \"Visit the IC3 Website\",\n          \"text\": \"Go to www.ic3.gov and select the option to file a complaint. You will need to accept the terms of service in the pop-up window to proceed.\"\n        },\n        {\n          \"@type\": \"HowToStep\",\n          \"name\": \"Fill Out the Form\",\n          \"text\": \"Complete the seven-step form, including complainant info, financial transactions, subject details, and a description of the incident. Note that Social Security numbers are typically not required.\"\n        },\n        {\n          \"@type\": \"HowToStep\",\n          \"name\": \"Follow Up\",\n          \"text\": \"While individual updates are rare, you can track general trends and cybercrime news through the IC3\u2019s public reports.\"\n        }\n      ]\n    }\n  ]\n}\n<\/script>\n\n\n\n\n<div style=\"background:#f3f4f6; padding:30px; border-radius:14px; max-width:950px; margin:20px auto; font-family: Arial, sans-serif; color: #333;\">\n  <div style=\"display:flex; gap:30px; align-items: flex-start; flex-wrap: nowrap;\">\n\n    <div style=\"flex: 0 0 160px; text-align: center;\">\n      <a href=\"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/\" style=\"text-decoration: none; border: none; display: block;\">\n        <img decoding=\"async\" src=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2026\/03\/Viktor-Sobiecki.jpg\"\n             alt=\"Dr. Viktor Sobiecki\"\n             style=\"width: 140px; height: 140px; object-fit: cover; border-radius: 50%; border: 1px solid #ddd; display: block; margin: 0 auto 12px auto;\">\n      <\/a>\n      <div style=\"margin: 0; font-size: 14px; line-height: 1.3; font-weight: 700;\">\n        Dr. Viktor Sobiecki<br \/>\n        <span style=\"font-weight: 400; color: #666;\">Chief Technology Officer (CTO)<\/span>\n      <\/div>\n    <\/div>\n\n    <div style=\"flex: 1;\">\n      <h3 style=\"margin: 0 0 10px 0; font-size: 24px; font-weight: 800; line-height: 1.2;\"><span class=\"ez-toc-section\" id=\"Dr_Viktor_Sobiecki\"><\/span>\n        <a href=\"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/\" style=\"color: #002db3; text-decoration: none;\">\n          Dr. Viktor Sobiecki\n        <\/a>\n      <span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n      <p style=\"font-size: 15px; color: #333; line-height: 1.5; margin: 0 0 20px 0;\">\n        Currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation,\n        where responsibilities span the leadership of advanced cybersecurity initiatives,\n        data breach incident responses, and corporate strategic planning.\n      <\/p>\n\n      <div style=\"display: flex; gap: 25px; align-items: center; flex-wrap: wrap;\">\n        <a href=\"https:\/\/www.digitalforensics.com\/certifications\"\n           style=\"display: flex; align-items: center; gap: 8px; color: #002db3; text-decoration: none; font-weight: 700; font-size: 16px; border-bottom: 2px solid #002db3; padding-bottom: 2px;\">\n           <span style=\"font-size: 20px;\">\ud83d\udcdc<\/span> Certificate\n        <\/a>\n\n        <a href=\"tel:+18008496515\"\n           style=\"display: flex; align-items: center; gap: 8px; color: #002db3; text-decoration: none; font-weight: 700; font-size: 16px; border-bottom: 2px solid #002db3; padding-bottom: 2px;\">\n           <span style=\"font-size: 20px;\">\ud83d\udcde<\/span> Call now\n        <\/a>\n\n        <a href=\"https:\/\/www.digitalforensics.com\/contact-us\"\n           style=\"display: flex; align-items: center; gap: 8px; color: #002db3; text-decoration: none; font-weight: 700; font-size: 16px; border-bottom: 2px solid #002db3; padding-bottom: 2px;\">\n           <span style=\"font-size: 20px;\">\ud83d\udcac<\/span> Contact Us!\n        <\/a>\n      <\/div>\n    <\/div>\n\n  <\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"Cybercrimes are growing at a rapid pace, targeting businesses and governments worldwide. Automation and generative artificial intelligence (AI)&hellip;","protected":false},"author":126,"featured_media":11314,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"csco_display_header_overlay":false,"csco_singular_sidebar":"","csco_page_header_type":"","footnotes":""},"categories":[773],"tags":[],"class_list":{"0":"post-8930","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-extortion","8":"cs-entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.6 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Report Cybercrime to the FBI\u2019s IC3<\/title>\n<meta name=\"description\" content=\"Learn how to report a cybercrime &amp; extortion to the FBI&#039;s IC3. Understand what to report, how to gather evidence, and when to contact other agencies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Steps to File A Cybercrime &amp; Extortion Report with the FBI&#039;s IC3\" \/>\n<meta property=\"og:description\" content=\"Learn how to report cyber extortion to the FBI&#039;s IC3. Understand what to report, how to gather evidence, and when to contact other agencies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/\" \/>\n<meta property=\"og:site_name\" content=\"Resources for Sextortion and Online Blackmail Victims\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DigitalForensicsCorp\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-12T14:54:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T18:31:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/FBI_Extortion_Reporting-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Viktor Sobiecki\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Steps to File A Cybercrime &amp; Extortion Report with the FBI&#039;s IC3\" \/>\n<meta name=\"twitter:description\" content=\"Learn how to report cyber extortion to the FBI&#039;s IC3. Understand what to report, how to gather evidence, and when to contact other agencies.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/FBI_Extortion_Reporting.jpg\" \/>\n<meta name=\"twitter:creator\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:site\" content=\"@ForensicsCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Viktor Sobiecki\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/\"},\"author\":{\"name\":\"Viktor Sobiecki\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\"},\"headline\":\"FBI IC3 Reporting Guide: How to Report Cybercrime to the FBI\",\"datePublished\":\"2025-02-12T14:54:34+00:00\",\"dateModified\":\"2025-06-02T18:31:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/\"},\"wordCount\":1843,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/FBI_Extortion_Reporting.jpg\",\"articleSection\":[\"Resources and Articles for Victims of Extortion Scams\"],\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/\",\"name\":\"How to Report Cybercrime to the FBI\u2019s IC3\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/FBI_Extortion_Reporting.jpg\",\"datePublished\":\"2025-02-12T14:54:34+00:00\",\"dateModified\":\"2025-06-02T18:31:08+00:00\",\"description\":\"Learn how to report a cybercrime & extortion to the FBI's IC3. Understand what to report, how to gather evidence, and when to contact other agencies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#faq-question-1776140589873\"},{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#faq-question-1776140603021\"},{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#faq-question-1776140619037\"},{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#faq-question-1776140633309\"}],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/FBI_Extortion_Reporting.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/02\\\/FBI_Extortion_Reporting.jpg\",\"width\":1280,\"height\":560,\"caption\":\"FBI Extortion Report\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources and Articles for Victims of Extortion Scams\",\"item\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"FBI IC3 Reporting Guide: How to Report Cybercrime to the FBI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"name\":\"Resources for Sextortion and Online Blackmail Victims\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#organization\",\"name\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/df-logo.png\",\"width\":393,\"height\":343,\"caption\":\"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DigitalForensicsCorp\\\/\",\"https:\\\/\\\/x.com\\\/ForensicsCorp\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/#\\\/schema\\\/person\\\/db7b63895c111dc8ed48df38d20b84ce\",\"name\":\"Viktor Sobiecki\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/viktor-sobiecki_avatar-96x96.jpg\",\"caption\":\"Viktor Sobiecki\"},\"description\":\"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.\",\"sameAs\":[\"https:\\\/\\\/www.digitalforensics.com\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/viktor-sobiecki\\\/\"],\"honorificPrefix\":\"Dr\",\"jobTitle\":\"Chief Technology Officer (CTO)\",\"worksFor\":\"Digital Forensics Corporation\",\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/author\\\/visor\\\/\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#faq-question-1776140589873\",\"position\":1,\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#faq-question-1776140589873\",\"name\":\"How do I report cybercrime to the FBI or IC3?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"You can dial 911 in an emergency and file a complaint with the IC3. In the latter scenario, you will have to file a report through their online portal or contact your local field office.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#faq-question-1776140603021\",\"position\":2,\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#faq-question-1776140603021\",\"name\":\"What should I include in a cybercrime report?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The IC3 requires the complainant\u2019s information, including name, address, telephone, and email address. You will also provide details of financial loss and transaction information.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#faq-question-1776140619037\",\"position\":3,\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#faq-question-1776140619037\",\"name\":\"What happens after I report cyber extortion to FBI?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The IC3 assigns your report to the receiving agency, which\u00a0may\u00a0further investigate\u00a0the case\u00a0and let you know its status.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"},{\"@type\":\"Question\",\"@id\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#faq-question-1776140633309\",\"position\":4,\"url\":\"https:\\\/\\\/www.digitalforensics.com\\\/blog\\\/extortion\\\/report-cybercrime-to-the-fbi\\\/#faq-question-1776140633309\",\"name\":\"Can Digital Forensics Corp. help after I file my report to FBI?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Yes, Digital Forensics Corp. can certainly help you with follow-up plans, documentation, and communication with authorities.\",\"inLanguage\":\"en-US\"},\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Report Cybercrime to the FBI\u2019s IC3","description":"Learn how to report a cybercrime & extortion to the FBI's IC3. Understand what to report, how to gather evidence, and when to contact other agencies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/","og_locale":"en_US","og_type":"article","og_title":"Steps to File A Cybercrime & Extortion Report with the FBI's IC3","og_description":"Learn how to report cyber extortion to the FBI's IC3. Understand what to report, how to gather evidence, and when to contact other agencies.","og_url":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/","og_site_name":"Resources for Sextortion and Online Blackmail Victims","article_publisher":"https:\/\/www.facebook.com\/DigitalForensicsCorp\/","article_published_time":"2025-02-12T14:54:34+00:00","article_modified_time":"2025-06-02T18:31:08+00:00","og_image":[{"width":1080,"height":1080,"url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/FBI_Extortion_Reporting-2.jpg","type":"image\/jpeg"}],"author":"Viktor Sobiecki","twitter_card":"summary_large_image","twitter_title":"Steps to File A Cybercrime & Extortion Report with the FBI's IC3","twitter_description":"Learn how to report cyber extortion to the FBI's IC3. Understand what to report, how to gather evidence, and when to contact other agencies.","twitter_image":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/FBI_Extortion_Reporting.jpg","twitter_creator":"@ForensicsCorp","twitter_site":"@ForensicsCorp","twitter_misc":{"Written by":"Viktor Sobiecki","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#article","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/"},"author":{"name":"Viktor Sobiecki","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce"},"headline":"FBI IC3 Reporting Guide: How to Report Cybercrime to the FBI","datePublished":"2025-02-12T14:54:34+00:00","dateModified":"2025-06-02T18:31:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/"},"wordCount":1843,"publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/FBI_Extortion_Reporting.jpg","articleSection":["Resources and Articles for Victims of Extortion Scams"],"inLanguage":"en-US"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/","url":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/","name":"How to Report Cybercrime to the FBI\u2019s IC3","isPartOf":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#primaryimage"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/FBI_Extortion_Reporting.jpg","datePublished":"2025-02-12T14:54:34+00:00","dateModified":"2025-06-02T18:31:08+00:00","description":"Learn how to report a cybercrime & extortion to the FBI's IC3. Understand what to report, how to gather evidence, and when to contact other agencies.","breadcrumb":{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#faq-question-1776140589873"},{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#faq-question-1776140603021"},{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#faq-question-1776140619037"},{"@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#faq-question-1776140633309"}],"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#primaryimage","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/FBI_Extortion_Reporting.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/02\/FBI_Extortion_Reporting.jpg","width":1280,"height":560,"caption":"FBI Extortion Report"},{"@type":"BreadcrumbList","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.digitalforensics.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Resources and Articles for Victims of Extortion Scams","item":"https:\/\/www.digitalforensics.com\/blog\/extortion\/"},{"@type":"ListItem","position":3,"name":"FBI IC3 Reporting Guide: How to Report Cybercrime to the FBI"}]},{"@type":"WebSite","@id":"https:\/\/www.digitalforensics.com\/blog\/#website","url":"https:\/\/www.digitalforensics.com\/blog\/","name":"Resources for Sextortion and Online Blackmail Victims","description":"","publisher":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digitalforensics.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digitalforensics.com\/blog\/#organization","name":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims","url":"https:\/\/www.digitalforensics.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2024\/12\/df-logo.png","width":393,"height":343,"caption":"Digital Defense Hub: Resources for Sextortion and Online Blackmail Victims"},"image":{"@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DigitalForensicsCorp\/","https:\/\/x.com\/ForensicsCorp"]},{"@type":"Person","@id":"https:\/\/www.digitalforensics.com\/blog\/#\/schema\/person\/db7b63895c111dc8ed48df38d20b84ce","name":"Viktor Sobiecki","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","url":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","contentUrl":"https:\/\/www.digitalforensics.com\/blog\/wp-content\/uploads\/2025\/07\/viktor-sobiecki_avatar-96x96.jpg","caption":"Viktor Sobiecki"},"description":"Dr. Viktor Sobiecki currently serves as the Chief Technology Officer (CTO) at Digital Forensics Corporation, where responsibilities span the leadership of advanced cybersecurity initiatives, data breach incident responses, and corporate strategic planning. Professional career has been driven by the intersection of innovation and practical application, particularly in the domains of cybersecurity and cyber crime investigations. He holds a Ph.D. in Computer Science and has contributed extensively to academic and industry advancements through publications, patents, and technological solutions addressing complex real-world challenges. As a professional with over 25 years of experience in the fields of cybersecurity, artificial intelligence, and digital forensics his career spans roles in academic research, software development, corporate leadership, and expert consulting, giving me a comprehensive understanding of the technical, strategic, and practical dimensions of projects. Expertise spans a wide range of technical domains, including: \u2022 Data Breach Incident Response: Managing immediate responses to cybersecurity crises, including the containment and mitigation of threats \u2022 Corporate Strategy Development: Designing long-term strategies to enhance organizational resilience against emerging cyber threats. \u2022 Expert Testimony: Providing legal and technical expertise in high-profile cybersecurity cases. \u2022 Artificial Intelligence and Machine Learning: Designing and implementing algorithms for data analysis, pattern recognition, and anomaly detection. \u2022 Network Security and Data Integrity: Developing solutions to protect critical systems from cyber threats, including encryption protocols and intrusion detection systems. \u2022 Cloud Computing and Hybrid Infrastructures: Creating scalable, resilient architectures for data storage, processing, and security.","sameAs":["https:\/\/www.digitalforensics.com\/","https:\/\/www.linkedin.com\/in\/viktor-sobiecki\/"],"honorificPrefix":"Dr","jobTitle":"Chief Technology Officer (CTO)","worksFor":"Digital Forensics Corporation","url":"https:\/\/www.digitalforensics.com\/blog\/author\/visor\/"},{"@type":"Question","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#faq-question-1776140589873","position":1,"url":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#faq-question-1776140589873","name":"How do I report cybercrime to the FBI or IC3?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"You can dial 911 in an emergency and file a complaint with the IC3. In the latter scenario, you will have to file a report through their online portal or contact your local field office.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#faq-question-1776140603021","position":2,"url":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#faq-question-1776140603021","name":"What should I include in a cybercrime report?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The IC3 requires the complainant\u2019s information, including name, address, telephone, and email address. You will also provide details of financial loss and transaction information.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#faq-question-1776140619037","position":3,"url":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#faq-question-1776140619037","name":"What happens after I report cyber extortion to FBI?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"The IC3 assigns your report to the receiving agency, which\u00a0may\u00a0further investigate\u00a0the case\u00a0and let you know its status.","inLanguage":"en-US"},"inLanguage":"en-US"},{"@type":"Question","@id":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#faq-question-1776140633309","position":4,"url":"https:\/\/www.digitalforensics.com\/blog\/extortion\/report-cybercrime-to-the-fbi\/#faq-question-1776140633309","name":"Can Digital Forensics Corp. help after I file my report to FBI?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Yes, Digital Forensics Corp. can certainly help you with follow-up plans, documentation, and communication with authorities.","inLanguage":"en-US"},"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/8930","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/users\/126"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=8930"}],"version-history":[{"count":42,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/8930\/revisions"}],"predecessor-version":[{"id":12740,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/posts\/8930\/revisions\/12740"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media\/11314"}],"wp:attachment":[{"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=8930"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=8930"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digitalforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=8930"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}