David Lindsey Colorado Attorney for Federal Crimes, Drug Crimes, White Collar, Fraud, Computer Crimes, Sex Crimes and Violent Crimes Defense

Have Questions?

Get Answers! Call 303.228.2270

Is “Sexting” a Crime?

There are two types of people in the world: those who “sext” and those who don’t. If you’re a part of the latter group, you don’t need to worry. But if you’re in the former, there could be cause for concern, depending on the content and recipient of your messages. For those who don’t know, a “sext” is a text message containing sexually suggestive or graphic material. In many cases,...
Continue reading
  473 Hits
473 Hits

Can I Be Forced to Share My Security Passwords?

Keeping your passwords – the words and phrases you use to protect electronic financial and other personal information – secure is one of the most important things you can do in this day and age. Neglecting to lock down information with strong passwords can result in long-term security risks. But what happens if you’re accused of a crime or you have information law enforcement wants access to and they ask...
Continue reading
  793 Hits
793 Hits

What You Should Know about Online Entrapment

Ask the average person on the street about entrapment and he or she will likely reply it is illegal and something law enforcement is not able to do, even to a known criminal. Unfortunately, the question of what is and is not entrapment is rarely considered until a person becomes the target of the practice. One of the most common instances in which the question of entrapment arises is in...
Continue reading
  1019 Hits
1019 Hits

Year in Review: Top Five Cyber Crimes of 2016 and What’s Ahead in the New Year

2016 was a busy year for cyber criminals and nobody expects things to slow down in the near future. What were some of this year’s most common crimes? 1. Many of the cyber crimes committed in 2016 involved ransomware. Often, ransomware was used by less experienced cyber criminals to restrict access to data and demand a “ransom” payment. The use of ransomware on mobile devices was also on the rise...
Continue reading
  914 Hits
914 Hits

What Wikileaks Should Teach You about Online Whistleblowing

The election has made Wikileaks a popular topic in the news lately, but exactly what Wikileaks is and how its actions can possibly be legal has many confused. Many people think Wikileaks is a group of hackers or an organization that hacks emails, but it is actually more complicated than that. Furthermore, if the average person tried to get away with what Wikileaks has done there is a good chance...
Continue reading
  1027 Hits
1027 Hits

Downloading Torrents: Are You Breaking the Law?

blog image
It’s been several years since stories about Napster and illegally downloading music online were all over the news, but issues with piracy are still putting people at risk every day. Though most people are aware that piracy of copyrighted materials is illegal, many do not fully understand what the practice includes. Things they believe are perfectly legal could land them in legal hot water, so it’s important to clarify what...
Continue reading
  2372 Hits
2372 Hits

Five of the Most Prolific Cybercrimes that Remain a Mystery

Cybercrimes are a dime a dozen, but some have risen to the top as being more nefarious, more bizarre, or more widespread than others. And many of these, to this day, remain unsolved. Consider these cybercrime “whoppers” that are remain unsolved years later: Blackmail Gone Wrong One of the best known credit card breaches occurred in January 2000, right after the relief of surviving the Y2K transition. The breach was,...
Continue reading
  1132 Hits
1132 Hits

Computer Crime Trends

Like many things, crime and computer crime tends to occur in trends. Computer crimes trends change at lightning speed and sometimes it’s tough to keep up. What trends are popular right now in computer crimes and what can we expect to see in the coming year? Attacks on a Specific Target Attacks have increasingly become more targeted in recent years. This means hackers choose a selected target, as opposed to...
Continue reading
  1345 Hits
1345 Hits

What Can You Expect If You are the Subject of a Computer Crimes Investigation?

If you believe you are being investigated for committing a computer crime, there are several things you should know. First and foremost, you need to contact an attorney familiar with defending people accused of computer crimes. Technology is constantly changing and the laws must do so, too. You need the support of an attorney willing to keep up with the changes. People use computers for just about everything these days,...
Continue reading
  1513 Hits
1513 Hits

Could the Recent Government Data Hack Affect You?

The Office of Personnel Management (OPM) recently revealed criminal hackers stole personal information from more than 20 million people, making it possibly the most significant data hack in history. Experts believe the fallout from the hack could compromise US intelligence and affect individual victims for years to come. Many believe China was responsible for the hack. OPM’s database was mostly unencrypted and monitored by a security team with barely any...
Continue reading
  1479 Hits
1479 Hits

Top Five Computer Crimes and What to Do If You are Accused of Any of Them

Computer crime is on the rise and as more people do more things online, the incidence of criminal activity is expected to continue. In addition to not falling victim to computer crimes, you also need to ensure what you are doing online is not illegal. Technology is constantly changing and it can be difficult to keep up with what is and is not legal. What are the five most common...
Continue reading
  1562 Hits
1562 Hits

What is Cyber stalking?

What is Cyber stalking? Most people think of stalking as something that involves in-person scenarios. An ex-boyfriend or girlfriend might follow you to work or show up at your home uninvited. A stranger struggling with mental health issues could see you in public and become obsessed with you. These are all frightening scenarios that describe stalking, but there is another place in which stalking can occur and be just as...
Continue reading
  2215 Hits
2215 Hits

Social Medial Computer Crimes

It seems everyone is using social media these days. From old school friends reconnecting on Facebook to people expressing their views about politics, sports, and daily life on Twitter to finding your next job on LinkedIn, social media has become a life-changing tool. Despite all the positive things it has brought into our lives, not everyone uses social media for good. In addition to the general negativity of people speaking...
Continue reading
  1589 Hits
1589 Hits

What is the Difference Between Hacking and Phishing?

Hacking and phishing are likely two terms you are familiar with, but unless you have been a victim or you work in an industry related to computer security you might not understand the difference between the two. Both crimes are typically committed by nefarious individuals intending to defraud someone out of money. However, in some cases, innocent actions can be misconstrued as an attempt to commit a computer crime. This...
Continue reading
  2680 Hits
2680 Hits

Have You Been Accused of a Computer Crime?

An accusation of a computer crime might not seem as serious as that of a violent crime or various other charges, but computer crimes are very serious. In most cases, committing a computer crime is a violation of federal law and for some could even violate international law. If you are suspected of a computer crime, you will be exposed to rigorous and intrusive investigation by various law enforcement agencies,...
Continue reading
  1900 Hits
1900 Hits

Computer Crimes: "Mean Girls" Create Fake Facebook Page

By David Lindsey Attorney of David Lindsey, Attorney at Law posted in Computer Crimes on Monday, September 24, 2012. In the first arrest under a new computer crime law governing online impersonation, a twelve year old and thirteen year old from Granbury, Texas are facing a felony charge after fabricating a Facebook page under the identity of a fellow middle school classmate. http://www.mdavidlindsey.com/Criminal-Defense/Computer-Crimes-Defense/ "The juveniles were using the fake Facebook...
Continue reading
  2092 Hits
2092 Hits

Emailing Your Attorney From a Work Computer May be a Bad Idea

On behalf of David Lindsey, Attorney at Law posted in Computer Crimes on Thursday, October 6, 2011. Emailing your attorney from a work email address may not be a good idea, according to a recent ethics opinion from the American Bar Association. In a recent interview on NPR, legal ethics expert Diane Karpman outlined the conflicts between attorney-client privilege and an employer's expectation of access to their employees' correspondence. "Clients...
Continue reading
  1528 Hits
1528 Hits

Computer Crimes: DOJ to Train Prosecutors in Cyber Espionage

By David Lindsey Attorney of David Lindsey, Attorney at Law posted in Computer Crimes on Wednesday, October 3, 2012. Citing what it calls a growing threat of computer crimes to national security, the United States Department of Justice has begun the training of more than 400 prosecutors as experts in the field of cyber espionage. http://www.mdavidlindsey.com/Criminal-Defense/Computer-Crimes-Defense/ An internal review has identified gaps in the department's identification of and response to...
Continue reading
  6332 Hits
6332 Hits

David Lindsey, Attorney at Law

7887 East Belleview Avenue, Suite 1100
Englewood, CO 80111
Map and Directions

Phone: 303-228-2270
Fax: 303-228-2271

Denver Office

1900 Grant Street, Suite 750
Denver, CO 80203
Map and Directions

Phone: 303-228-2270
Fax: 303-228-2271