<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Cyber Crimes - David Lindsey, Attorney at Law]]></title>
        <atom:link href="https://www.mdavidlindsey.com/blog/tags/cyber-crimes/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.mdavidlindsey.com/blog/tags/cyber-crimes/</link>
        <description><![CDATA[David Lindsey's Website]]></description>
        <lastBuildDate>Mon, 26 Aug 2024 19:06:26 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[When is an Internet Search a Crime?]]></title>
                <link>https://www.mdavidlindsey.com/blog/when-is-an-internet-search-a-crime/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/when-is-an-internet-search-a-crime/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Fri, 25 Jan 2019 19:07:58 GMT</pubDate>
                
                    <category><![CDATA[Miscellaneous Criminal Defense]]></category>
                
                
                    <category><![CDATA[Criminal Defense Lawyer]]></category>
                
                    <category><![CDATA[Cyber Crimes]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                    <category><![CDATA[Torrents]]></category>
                
                
                
                <description><![CDATA[<p>Internet search can be a crime It should come as no surprise that people search for all sorts of things online. The idea of having one’s search history revealed publicly can send chills down the average person’s spine, even if most of their searches are relatively benign. Despite the awkward nature of most people’s search&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <div class="wp-block-image"><figure class="alignright"><img loading="lazy" decoding="async" src="/static/2023/07/fe_19192923.jpg" alt="internet crime" width="300" height="300" /></figure></div>
<h3 class="wp-block-heading">Internet search can be a crime</h3>
  <p>It should come as no surprise that people search for all sorts of things online. The idea of having one’s search history revealed publicly can send chills down the average person’s spine, even if most of their searches are relatively benign.</p>  <p>Despite the awkward nature of most people’s search histories, the majority of searches are perfectly legal. People are searching for information and even if that information is unusual or related to something criminal, the search itself is not a crime.</p>  <p>That said, there are searches that are illegal. There are situations in which simply searching for information online can get you into trouble. Knowing what’s legal and illegal when it comes to internet searches can help you avoid problems.</p>  
<h3 class="wp-block-heading">A good example of an Internet search crime is child pornography.</h3>
  <p>Viewing many types of pornography online is perfectly legal. As a matter of fact, pornography is one of the most successful online industries in existence. But if pornographic material involves participants under the age of 18, viewing it violates the law.</p>  <p>Just searching for child pornography without actually viewing it can get you arrested for a crime. You also don’t need to download pornographic material with children to be committing a crime. Searching for and viewing the material can result in it being stored in your browser’s cache, which legally could be categorized as possessing child pornography.</p>  
<h3 class="wp-block-heading">What If I Viewed Illegal Pornography by Accident?</h3>
  <p>Accidentally viewing illegal pornographic material online is not a crime, but proving your actions were accidental can be difficult.</p>  <p>There are many people who stumbled upon child pornography accidentally without intending to look at illegal material, but explaining how you arrived at that point unintentionally can be challenging, not to mention embarrassing.</p>  
<h3 class="wp-block-heading">What Happens If I’m Accused of Viewing Child Pornography Online?</h3>
  <p>If you search for or view child pornography online, regardless of whether your actions were intentional or accidental, you could face criminal charges. There are laws against child pornography at the federal and state levels, and a conviction related to child porn can result in several years in prison, fines, and other consequences.</p>  
<h3 class="wp-block-heading">A strong criminal defense is your best tool for fighting accusations of child pornography.</h3>
  <p>Law enforcement and prosecutors could launch an investigation into your activities online if you are accused of possession of illegal pornography. This will involve not only what you were doing in relation to the material in question, but will also include your usual online activities. Your computer will be confiscated and your entire search history will be examined.</p>  <p>Even if you did not actively search for illegal material and the current material in question was acquired or accessed by accident, a previous search that seems suspicious could be used against you.</p>  
<h3 class="wp-block-heading">What about Other Illegal Searches and Material Found Online?</h3>
  <p>Child pornography is not the only instance in which a person could be accused of a crime based on an internet search. Searches that can be linked to terrorism or acts of public violence can attract the attention of authorities, even if you don’t ever act on the search. Investigators will look at the context of your search, including other searches you’ve conducted, and if they believe you are gathering information with the intention of carrying out an illegal act, it could result in criminal charges.</p>  <p>It is also illegal to obtain copyright protected material using torrent downloading. In many cases, this is much less “scandalous” than looking at child pornography or searching for how to build a bomb, but it’s illegal nonetheless. Downloading, sharing, or streaming copyrighted material online is a violation of federal copyright law. Fines for copyright violations can be steep and it’s possible to spend time in jail. There might also be civil lawsuits filed against you.</p>  <p>For more information on torrent use, check out <a href="https://www.maketecheasier.com/is-downloading-torrent-legal-or-illegal/" target="_blank" rel="noopener noreferrer">this article from maketecheasier.com</a>.</p>  <p>Finally, you need to use care if you choose to access the “deep” or “dark” web. Authorities keep careful tabs, as much as they can, on internet activity that takes place on the deep web and simple searches can raise flags and make you the subject of an investigation.</p>  <p>There are endless things you can do, say, read, and view online that are perfectly legal. There are also some things that are illegal and will get you into trouble. If you stumble into one of these questionable situations, either intentionally or by accident, it’s important to have a legal expert on your side.</p>  <p>For more information or to discuss accusations of illegal internet activity with an expert, <a title="Internet Crimes Criminal Defense Attorney" href="/#link_tab">contact criminal defense attorney David Lindsey</a> to schedule a free consultation.</p>  ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Year in Review: Top Five Cyber Crimes of 2016 and What’s Ahead in the New Year]]></title>
                <link>https://www.mdavidlindsey.com/blog/year-in-review-top-five-cyber-crimes-of-2016-and-what-s-ahead-in-the-new-year/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/year-in-review-top-five-cyber-crimes-of-2016-and-what-s-ahead-in-the-new-year/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Tue, 20 Dec 2016 15:39:25 GMT</pubDate>
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                    <category><![CDATA[Cyber Crimes]]></category>
                
                    <category><![CDATA[Data Crimes]]></category>
                
                    <category><![CDATA[Hacking Crimes]]></category>
                
                    <category><![CDATA[Ransomware]]></category>
                
                
                
                <description><![CDATA[<p>2016 was a busy year for cyber criminals and nobody expects things to slow down in the near future. What were some of this year’s most common crimes? 1. Many of the cyber crimes committed in 2016 involved ransomware. Often, ransomware was used by less experienced cyber criminals to restrict access to data and demand&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <p>2016 was a busy year for cyber criminals and nobody expects things to slow down in the near future. What were some of this year’s most common crimes?</p>  <p>1. Many of the cyber crimes committed in 2016 involved ransomware. Often, ransomware was used by less experienced cyber criminals to restrict access to data and demand a “ransom” payment. The use of ransomware on mobile devices was also on the rise this year and expected to continue in the New Year.</p>  <p>2. As predicted, criminals took advantage of cloud services protected by weak corporate security policies in 2016. The cloud continues to grow with the amount of confidential business information it houses, and more and more businesses are putting their financial information, business strategies, acquisition and divestiture plans, and employee data at risk.</p>  <p>3. As automobiles become increasingly cyber-friendly, cyber crime risks also increase. Vehicle makers are working to improve IT security by developing standards and technical solutions to protect attack surfaces, including vehicle access system engine control units (ECUs), engine and transmission ECUs, advanced driver assistance system ECUs, remote key systems, passive keyless entry, V2X receiver, USBs, OBD IIs, remote link type apps, and smartphone access.</p>  <p>4. Personal information stolen by criminals is being linked together in big data warehouses, creating a valuable collection for cyber attackers to trade and sell. This is expected to continue in 2017, as criminals continue to develop an even more robust dark market for stolen personally identifiable information and usernames and passwords.</p>  <p>5. Integrity attacks were on the rise and 2016 saw stealthy, selective compromises to the integrity of systems and data. Attacks such as these involve seizing and modifying transactions or data to help perpetrators. An example of an integrity attack is the changing of direct deposit settings for a victim’s paychecks, so the money is deposited into a different account.</p>  <p><strong>What’s on the Horizon and 2017 and Beyond?</strong></p>  <p>Cyber criminals are expected to improve their detection-avoiding abilities by targeting new attack surfaces, employing more sophisticated methods of attack, and evading security technology. There is also expected to be an increase in attacks on wearables.</p>  <p>There is also growing concern for corporate cyberespionage. Cyber security experts McAfee Labs is predicting the dark market for malware code and hacking services could enable malware to be used for financial intelligence-gathering and the manipulation of the financial markets.</p>  <p>As the transition continues to digital storage of data, opportunities for cyber criminals to take advantage increases. Criminals are also expected to form better organized networks that allow them to share stolen information and receive compensation for sharing that data.</p>  <p>The growing complexities not only put individuals and businesses at risk, it also creates confusion for law enforcement and the judicial system. The likelihood of someone being accused of doing something wrong or unintentionally committing a crime is greater, based on the various ways there are of breaking cyber laws. If you have questions about any of the latest trends in cyber crime or you need to speak to someone about allegations against you, contact David Lindsey to schedule a free consultation to discuss your situation.</p>  ]]></content:encoded>
            </item>
        
    </channel>
</rss>