Reporting technology crime
Please refer to the quick reporting guide to determine the appropriate investigative authority for the type of technology enabled crime / fraud you wish to report.
Technology enabled crime encompasses:
- offences committed directly against computers, computer systems and communications technologies.
Examples include: hacking, denial of service, distributed denial of service.
- offences where the use of the Internet or information technology is integral to the commission of the offence.
Examples include: eBay fraud, email threats, email stalking, stealing, unlawful use of computer systems.
What is NOT technology enabled crime:
- offences where the use of a technology is merely incidental to the commission of the offence.
Examples: Use of a phone to video record an event, stealing a computer.
If you believe that you may be the victim of technology enabled crime and you wish to report the matter with police, it is useful to gather the following information prior to contacting the Australian Cybercrime Online Reporting Network (ACORN).
- Age/date of birth
- Email address
- Employment details
- Company or business details
Summary of allegations
Provide a chronological summary of the events and activities which form the basis of your complaint. Include the time, date and place of any conversations or interaction with the suspect/s regarding the complaint and any other relevant issues.
Provide all known details of the suspect/s, including:
- full name (and any aliases)
- age/date of birth
- corporate titles, company names, business and trading names used by the suspect/s
- home and company addresses
- telephone numbers
- email addresses
- vehicle registration number (if applicable)
Provide details of any witnesses, including:
- email addresses
- phone number (work and home)
- brief summary why this person is a witness
Provide copies (copies only) of documents or exhibits which support the complaint. This may include, but not limited to, banking records, business records, receipts, contracts, invoices, internet content, emails, phone records, and audit reports (please see Check List).
Note: to prevent the loss of forensic evidence please ensure each exhibit is stored in a separate bag or sleeve.
Current/past action against suspect
Provide details of any disciplinary action or civil litigation taken against the suspect/s (pending or otherwise) and/or any other Government Agency or regulating body to which this matter has also been reported.
For further information and assistance please visit the Australian Cybercrime Online Reporting Network (ACORN).