Skip to main content

#145-Leveraging the Advanced Capabilities of the Gemini Ecosystem, Google Is Setting New Standards for What AI Can Achieve, by Virtue of Sundar Pichai’s Unwavering Commitment to Excellence #special

Introduction Gemini, Google's most elegant AI, is set to transform industries with its advanced technology and user-friendly solutions. Google's commitment to pushing the boundaries of AI is evident in the development of the Gemini ecosystem. This advanced AI system is designed to handle complex tasks with precision and efficiency, making it a game-changer in the world of artificial intelligence. Businesses across different sectors are leveraging the power of Gemini to streamline operations, improve decision-making processes, and drive growth. By harnessing Google's most capable AI through the Gemini ecosystem, organizations can unlock new opportunities for innovation and stay ahead in today's competitive landscape. As Google continues to refine and expand the capabilities of Gemini, we can expect even more groundbreaking applications that will shape the future of AI technology. The possibilities are endless with Google's most capable AI leading the way towards a s

#107-How to File a Complaint with the Federal Bureau of Investigation Internet Crime Complaint Center




With cyber threats on the rise worldwide, the US citizens need to know what steps they can take when they find out they have been victim to a cybercrime. The FBI Cyber Division was established in 2002, 11 years after the world wide web was made public, to protect the US citizens from threats in the cyber world. We can understand the ability of the bureau to neutralize cyber threats and why such ability is necessary if we go through the Department of Justice Audit Report 11-22. The executive summary mentions, “Computer systems integral to the infrastructure, economy, and defense of the United States are under constant attack by a growing array of adversaries”. Who are these adversaries? The following part is redacted but it is not difficult to guess who they are. Terrorists, organized criminal gangs, people with some twisted sense of freedom … the list is long. The report goes on to mention that in 2008 alone, the Department of Homeland Security published information about 5,499 intrusions on the computer systems of US government … intrusions that were known. In the report, we find how the FBI agents were utilized in the fiscal year 2009 on cyber investigations. 31% of the agents were allocated to cases involving criminal intrusion, 19% were allocated to cases of national security intrusion, and 4% were allocated to cases of internet fraud. In the next years, the cyber division kept getting better and better and now, the FBI is the leading federal agency entrusted with responsibilities to investigate cyber attacks from a multifaceted base of enemies.

On Feb 9, 2016, the Cybersecurity National Action Plan (CNAP) was released that put emphasis on improving the bureau’s cyber incident response capabilities. Every American admires the commitment of cyber experts at the bureau who spend tireless hours on cases where innocent citizens have fallen victim to cyber criminals and bring them to justice. An important initiative taken by the bureau to ensure people can immediately file a complaint with the FBI upon realizing they have fallen victim to a cybercrime is the Internet Crime Complaint Center or IC3. Its mission statement states that it was set up to “provide the public with a reliable and convenient reporting mechanism to submit information to the Federal Bureau of Investigation concerning suspected Internet-facilitated criminal activity and to develop effective alliances with law enforcement and industry partners.” It was set up in 2000 and till now it has received complaints covering the entire gamut of cyber crimes, from computer intrusions to online frauds, identity thefts, corporate espionage, and others. In the beginning, it was known as the Internet Fraud Complaint Center and was rechristened to the Internet Crime Complaint Center in 2003, as it did not take long for the experts to observe that every category of cybercrime overlaps with many other related categories of cyber crimes.

If you are considering filing a complaint at the Internet Crime Complaint Center, please understand that if you are in immediate danger call 911 or local police. Please also understand that submitting a false complaint can mean imprisonment, fine, or both. The information submitted in the complaint can be shared with law enforcement agencies at various levels, both domestic and international, and regulatory agencies. If you have noticed unauthorized charges on your credit card and you are filing a complaint at IC3, the complaint will not act as a notification of dispute or of your credit card no. being compromised to the credit card corporation. You should contact the corporation directly. After you accept the terms and conditions, you will reach the complaint submission form page. The form is divided into 8 sections. In the first section, victim information, provide basic information such as, name, business name, age etc. In the next section, you need to provide details regarding the financial transaction(s) related to the complaint. You can add details of one or more financial transactions in this section. If there are no financial transactions related to the incident skip the section. In the third section, description of incident, describe the details regarding the incident, especially information that you are not providing in other sections of the form. You need to enter the method(s) used in the incident. You need to store original documents or other evidence as they might be required in the course of the investigation. The next section is dedicated to information about the subject(s) who victimized you. If the subject(s) are known, enter basic information about each of them else skip the section. In the fifth section, provide other related information, for instance, the complete copy of the email used in the incident, if applicable, etc. You need to mention here if this is an update to a complaint filed before. The sixth section is for declaring whether the person filing the complaint i.e. you were a victim in the incident described. If you are not, you are required to provide your contact information. In the seventh section, you will find the privacy act statement that mentions the statutes that authorize the collection of information in the form. In the eighth and last section, digital signature, you need to digitally sign the form by typing your full name. At this point, you have finished filling up the form. Don’t submit the form immediately. Review the information provided in the form three times, edit the information if necessary, and then submit the form. After successful submission, save a copy or take a printout for future references. After a complaint is filed, it is reviewed by trained analysts who collaborate with law enforcement agencies and regulatory agencies in and outside the US. IC3 forwards the complaint to agencies that have jurisdiction and these agencies conduct investigation and prosecution, if deemed necessary. IC3 is not responsible to provide investigation status report regarding a complaint.

Up to 2014, 3,175,611 complaints were received by IC3 since the day it started operations of which 269,422 complaints were submitted in 2014. In addition to presenting the people of the US a robust mechanism to report internet crimes, it also publishes public service announcements aimed at increasing public awareness about unfolding patterns and latest trends in the world of cyber crimes.

If you are a US citizen who has fallen victim to a cybercrime, you can hire A Joshing Moth to prepare and submit the complaint at IC3.

Image credit: Marc PEZIN, unsplash.com

Popular posts from this blog

#145-Leveraging the Advanced Capabilities of the Gemini Ecosystem, Google Is Setting New Standards for What AI Can Achieve, by Virtue of Sundar Pichai’s Unwavering Commitment to Excellence #special

Introduction Gemini, Google's most elegant AI, is set to transform industries with its advanced technology and user-friendly solutions. Google's commitment to pushing the boundaries of AI is evident in the development of the Gemini ecosystem. This advanced AI system is designed to handle complex tasks with precision and efficiency, making it a game-changer in the world of artificial intelligence. Businesses across different sectors are leveraging the power of Gemini to streamline operations, improve decision-making processes, and drive growth. By harnessing Google's most capable AI through the Gemini ecosystem, organizations can unlock new opportunities for innovation and stay ahead in today's competitive landscape. As Google continues to refine and expand the capabilities of Gemini, we can expect even more groundbreaking applications that will shape the future of AI technology. The possibilities are endless with Google's most capable AI leading the way towards a s

#124-Domino’s Pizza Web App Review: Dandy, Delicate, & Delicious

As people keep getting more dependent on online food delivery services, we cannot forget the food that started it all. Pizza was probably the first food ordered online. It happened in 1994 . Online pizza delivery has come a long way since then. However, the core elements remain the same. In this article, our team reviews the domino’s pizza web app. We visited www.dominos.co.in . The web app has a landscape mode issue on desktop at browser window size 1024x576 (“Landscape Mode is Currently not Supported. For the best experience please rotate your device.”). The home page is 2.6 MB. It has a load time of 2.25 s . The green order button is prominently visible on the home page. It will attract most of your attention when you are on the page. The button has an exceptional sense of exuberance attached to it. When you scroll down, the button appears in a sticky header banner. The home page also presents coupons & offers & gift cards. One can also download the domino’s app on android o

#144-By Delving Into the World of Android Photo Compositions, Photographers Can Elevate Their Skills to Capture Captivating Moments With Precision and Creativity #special

In the realm of photography, Android devices have become increasingly popular due to their advanced camera capabilities and user-friendly interfaces. With the advent of various photo editing applications and tools, Android users now have the ability to create stunning compositions directly from their smartphones.   Android photo compositions refer to the art of arranging and combining different elements within a photograph to create visually appealing and impactful images. These compositions can range from simple arrangements of objects or subjects within a frame to more complex techniques such as rule of thirds, leading lines, symmetry, and framing.   Thanks to the advancements in technology, Android users have access to a wide range of features and functionalities that aid in creating captivating photo compositions. From built-in filters and effects to manual adjustments for exposure, contrast, and saturation, these tools empower photographers with endless possibilities for c