<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[Internet Crimes - David Lindsey, Attorney at Law]]></title>
        <atom:link href="https://www.mdavidlindsey.com/blog/tags/internet-crimes/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.mdavidlindsey.com/blog/tags/internet-crimes/</link>
        <description><![CDATA[David Lindsey's Website]]></description>
        <lastBuildDate>Mon, 26 Aug 2024 19:06:26 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Could Hiring a Computer Repair Service Lead to Child Pornography Charges against You? Maybe.]]></title>
                <link>https://www.mdavidlindsey.com/blog/computer-repair-criminal-charges/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/computer-repair-criminal-charges/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Tue, 17 Sep 2019 20:56:41 GMT</pubDate>
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                    <category><![CDATA[Criminal Defense Lawyer]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                <description><![CDATA[<p>Hiring a computer repair service can lead to criminal charges. Looking at questionable material can lead you into a number of scary scenarios. And in many cases, people intentionally search for content they know they shouldn’t be viewing but the temptation is too great, even though doing so can get them in trouble. What makes&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <div class="wp-block-image"><figure class="alignright"><img loading="lazy" decoding="async" src="/static/2023/07/c8_93717860.jpg" alt="computer repair" width="300" height="200" /></figure></div>
<h3 class="wp-block-heading">Hiring a computer repair service can lead to criminal charges.</h3>
  <p>Looking at questionable material can lead you into a number of scary scenarios. And in many cases, people intentionally search for content they know they shouldn’t be viewing but the temptation is too great, even though doing so can get them in trouble.</p>  <p>What makes some people bold enough to hunt for illegal material online is the fact they are convinced they’ll get away with it. They don’t believe anyone will find out about their activities and they figure if they delete anything they download and/or delete their search history nobody will be aware of their activities.</p>  <p>This isn’t always the case though.</p>  <p>Recently, news surfaced that the FBI has been using Best Buy’s Geek Squad repair personnel as informants. This means that without your knowledge and certainly without a search warrant, law enforcement officials have and are willing to intrude upon your personal property and disregard your rights – all because you needed to have your computer repaired.</p>  <p>The fact that individual Geek Squad employees had been recruited by the FBI has been public knowledge for some time now. But more recently it was revealed that a relationship exists between Best Buy and the FBI. The entire company has been working with federal agents for over a decade and until recently that fact was unbeknown to customers of big box tech retailer.</p>  <p>The information came to light as a result of a Freedom of Information Act request submitted by the Electronic Frontier Foundation. You can learn more about that organization <a href="https://www.eff.org" target="_blank" rel="noopener noreferrer">here</a>.</p>  
<h3 class="wp-block-heading">What is Best Buy and the Geek Squad Doing with the Feds?</h3>
  <p>Essentially, when customers dropped off their computers for repair at Best Buy, they were exposing everything on their computers to the FBI. Anything the Geek Squad found on computers it was servicing could have been reported to the agency. In most cases, these reports were linked to anything questionable found on a device related to child pornography.</p>  <p>In one case in California, a physician was prosecuted after images depicting child abuse were found on his computer by the Geek Squad. It was revealed during that trial that there were at least eight Geek Squad members working as informants and receiving up to $1000 when they turned information over to the FBI.</p>  <p>Later, it was revealed that in addition to those individual Geek Squad employees, Best Buy had hosted an employee meeting that included the FBI’s Cyber Crimes Working Group.</p>  
<h3 class="wp-block-heading">What Happens If the Geek Squad Finds Something on Your Computer?</h3>
  <p>When questionable materials are found on a customer’s computer, Best Buy employees report it to the FBI and the device is seized.</p>  <p>There were some instances in which the FBI secured a search warrant in order to search a device, but that only occurred after searches performed by the Geek Squad revealed questionable material. This type of search violates the legal rights of citizens guaranteed under the Fourth Amendment.</p>  <p>Of course, a lot of people believe that if a person is viewing child pornography they deserve whatever punishment they receive, regardless of how the evidence against them was gathered.</p>  <p>But what if the material on your computer is not child pornography but a member of the Geek Squad determines it is worth a review by the FBI? What if you have photos of your own children on your computer and Best Buy employees deem them inappropriate? What if something was downloaded onto your computer without your knowledge?</p>  <p>It’s understandable why Best Buy customers or anyone who uses a third-party to repair their computer or another tech device would be worried that someone with very limited law enforcement training would be reporting on anything they find to the FBI.</p>  <p>If you are concerned that something on your computer could get you into legal trouble or you believe the FBI or another law enforcement organization is investigating you as a result of a repair service viewing your images or other data, <a href="/contact-us/">contact David Lindsey to schedule a free consultation</a>.</p>  <p> </p>  ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[When is an Internet Search a Crime?]]></title>
                <link>https://www.mdavidlindsey.com/blog/when-is-an-internet-search-a-crime/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/when-is-an-internet-search-a-crime/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Fri, 25 Jan 2019 19:07:58 GMT</pubDate>
                
                    <category><![CDATA[Miscellaneous Criminal Defense]]></category>
                
                
                    <category><![CDATA[Criminal Defense Lawyer]]></category>
                
                    <category><![CDATA[Cyber Crimes]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                    <category><![CDATA[Torrents]]></category>
                
                
                
                <description><![CDATA[<p>Internet search can be a crime It should come as no surprise that people search for all sorts of things online. The idea of having one’s search history revealed publicly can send chills down the average person’s spine, even if most of their searches are relatively benign. Despite the awkward nature of most people’s search&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <div class="wp-block-image"><figure class="alignright"><img loading="lazy" decoding="async" src="/static/2023/07/fe_19192923.jpg" alt="internet crime" width="300" height="300" /></figure></div>
<h3 class="wp-block-heading">Internet search can be a crime</h3>
  <p>It should come as no surprise that people search for all sorts of things online. The idea of having one’s search history revealed publicly can send chills down the average person’s spine, even if most of their searches are relatively benign.</p>  <p>Despite the awkward nature of most people’s search histories, the majority of searches are perfectly legal. People are searching for information and even if that information is unusual or related to something criminal, the search itself is not a crime.</p>  <p>That said, there are searches that are illegal. There are situations in which simply searching for information online can get you into trouble. Knowing what’s legal and illegal when it comes to internet searches can help you avoid problems.</p>  
<h3 class="wp-block-heading">A good example of an Internet search crime is child pornography.</h3>
  <p>Viewing many types of pornography online is perfectly legal. As a matter of fact, pornography is one of the most successful online industries in existence. But if pornographic material involves participants under the age of 18, viewing it violates the law.</p>  <p>Just searching for child pornography without actually viewing it can get you arrested for a crime. You also don’t need to download pornographic material with children to be committing a crime. Searching for and viewing the material can result in it being stored in your browser’s cache, which legally could be categorized as possessing child pornography.</p>  
<h3 class="wp-block-heading">What If I Viewed Illegal Pornography by Accident?</h3>
  <p>Accidentally viewing illegal pornographic material online is not a crime, but proving your actions were accidental can be difficult.</p>  <p>There are many people who stumbled upon child pornography accidentally without intending to look at illegal material, but explaining how you arrived at that point unintentionally can be challenging, not to mention embarrassing.</p>  
<h3 class="wp-block-heading">What Happens If I’m Accused of Viewing Child Pornography Online?</h3>
  <p>If you search for or view child pornography online, regardless of whether your actions were intentional or accidental, you could face criminal charges. There are laws against child pornography at the federal and state levels, and a conviction related to child porn can result in several years in prison, fines, and other consequences.</p>  
<h3 class="wp-block-heading">A strong criminal defense is your best tool for fighting accusations of child pornography.</h3>
  <p>Law enforcement and prosecutors could launch an investigation into your activities online if you are accused of possession of illegal pornography. This will involve not only what you were doing in relation to the material in question, but will also include your usual online activities. Your computer will be confiscated and your entire search history will be examined.</p>  <p>Even if you did not actively search for illegal material and the current material in question was acquired or accessed by accident, a previous search that seems suspicious could be used against you.</p>  
<h3 class="wp-block-heading">What about Other Illegal Searches and Material Found Online?</h3>
  <p>Child pornography is not the only instance in which a person could be accused of a crime based on an internet search. Searches that can be linked to terrorism or acts of public violence can attract the attention of authorities, even if you don’t ever act on the search. Investigators will look at the context of your search, including other searches you’ve conducted, and if they believe you are gathering information with the intention of carrying out an illegal act, it could result in criminal charges.</p>  <p>It is also illegal to obtain copyright protected material using torrent downloading. In many cases, this is much less “scandalous” than looking at child pornography or searching for how to build a bomb, but it’s illegal nonetheless. Downloading, sharing, or streaming copyrighted material online is a violation of federal copyright law. Fines for copyright violations can be steep and it’s possible to spend time in jail. There might also be civil lawsuits filed against you.</p>  <p>For more information on torrent use, check out <a href="https://www.maketecheasier.com/is-downloading-torrent-legal-or-illegal/" target="_blank" rel="noopener noreferrer">this article from maketecheasier.com</a>.</p>  <p>Finally, you need to use care if you choose to access the “deep” or “dark” web. Authorities keep careful tabs, as much as they can, on internet activity that takes place on the deep web and simple searches can raise flags and make you the subject of an investigation.</p>  <p>There are endless things you can do, say, read, and view online that are perfectly legal. There are also some things that are illegal and will get you into trouble. If you stumble into one of these questionable situations, either intentionally or by accident, it’s important to have a legal expert on your side.</p>  <p>For more information or to discuss accusations of illegal internet activity with an expert, <a title="Internet Crimes Criminal Defense Attorney" href="/#link_tab">contact criminal defense attorney David Lindsey</a> to schedule a free consultation.</p>  ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What You Should Know about Online Entrapment]]></title>
                <link>https://www.mdavidlindsey.com/blog/what-you-should-know-about-online-entrapment/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/what-you-should-know-about-online-entrapment/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Tue, 21 Feb 2017 19:33:19 GMT</pubDate>
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                    <category><![CDATA[Entrapment]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                <description><![CDATA[<p>Ask the average person on the street about entrapment and he or she will likely reply it is illegal and something law enforcement is not able to do, even to a known criminal. Unfortunately, the question of what is and is not entrapment is rarely considered until a person becomes the target of the practice.&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <p>Ask the average person on the street about entrapment and he or she will likely reply it is illegal and something law enforcement is not able to do, even to a known criminal. Unfortunately, the question of what is and is not entrapment is rarely considered until a person becomes the target of the practice.</p>  <p>One of the most common instances in which the question of entrapment arises is in potential child predator cases. Often, men (and sometimes women) targeted by law enforcement are not child predators at all, but are enticed into behaving as such by law enforcement in their effort to identify real criminals.</p>  <p>Law enforcement officials go online posing as children and participate in conversations with people who might be lonely and seeking attention, or simply interested in a dating adventure or love connection. One of the most common sites used to ensnare the vulnerable is Craigslist’s personals section because it is free of charge. In order to participate in this section of Craigslist users must confirm they are at least 18 years old, which means others assume everyone with whom they interact is of legal age of consent.</p>  <p>So is law enforcement crossing the line by propositioning people on Craigslist and attempting to lure them into committing a crime, or should anyone meeting someone from the internet request ID to confirm age?</p>  <p><strong>Every Case is Different</strong></p>  <p>Whether or not you will be accused of being a child predator and found guilty of a crime depends on the specific details of your case. The prosecution will argue you believed the person with whom you were interacting to be a minor – or at least had warning the person was under 18 – and that you intended to commit some kind of sexual act with him or her. Your defense will need to prove you not only believed the person to be of age, but that you had no prior intention of engaging in sex acts with a minor. This can be a tough challenge and there have been instances in which defendants were found guilty, even if it seemed there was strong evidence in his or her favor.</p>  <p>So what should you do if you think you are being targeted as a child predator and lured into taking action that could get you into trouble? Obviously, it’s best to avoid these situations, but for many looking to make a romantic connection and take a chance on someone they “click” with online, this can be tough. If you do choose to meet someone you’ve met online, schedule your first meeting in a public place, if possible. You can always move to a private location, should you determine the meeting is on the “up and up” and you feel safe.</p>  <p>If anything seems suspicious about someone you meet online, err on the side of caution. There is a fine line between being adventurous and breaking the law, and law enforcement will do all it can to convince a jury your intention was the latter.</p>  <p><strong>What Can You Do If You are the Victim of a Trap?</strong></p>  <p>And if you find yourself in a situation where your intentions were misunderstood or you believe you were misled by law enforcement, you need to contact an attorney immediately. In this day and age, with internet dating now the norm, it is possible for someone with the best intentions to find themselves in legal trouble and the only way out of the situation is with the representation of an experienced attorney.</p>  <p>If you would like to speak to someone about your circumstances,<a href="/contact-us/"> contact David Lindsey</a> to schedule a free consultation to discuss your situation.</p>  <p> </p>  ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What Wikileaks Should Teach You about Online Whistleblowing]]></title>
                <link>https://www.mdavidlindsey.com/blog/what-wikileaks-should-teach-you-about-online-whistleblowing/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/what-wikileaks-should-teach-you-about-online-whistleblowing/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Fri, 04 Nov 2016 19:49:03 GMT</pubDate>
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                <description><![CDATA[<p>The election has made Wikileaks a popular topic in the news lately, but exactly what Wikileaks is and how its actions can possibly be legal has many confused. Many people think Wikileaks is a group of hackers or an organization that hacks emails, but it is actually more complicated than that. Furthermore, if the average&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <p>The election has made Wikileaks a popular topic in the news lately, but exactly what Wikileaks is and how its actions can possibly be legal has many confused. Many people think Wikileaks is a group of hackers or an organization that hacks emails, but it is actually more complicated than that. Furthermore, if the average person tried to get away with what Wikileaks has done there is a good chance he or she would end up in jail.</p>  <p><strong>What Should You Know about Wikileaks?</strong></p>  <p>Since 2006, Wikileaks has published classified information on the internet. Wikileaks was founded by Australian computer hacker Julian Assange, who also serves as the director of the organization. The international organization receives the information it publishes from anonymous sources, many of whom consider themselves whistleblowers.</p>  <p>One way in which Wikileaks protects itself from legal action is to rely on an anonymous volunteer network to retrieve its information. It claims it is not actually hacking information, but instead, providing a resource for its volunteers throughout the United States, Australia, Europe, Asia, and Africa to publish information. Despite being called volunteers, many of the people who provide Wikileaks information are sometimes paid.</p>  <p>Much of the information published on the site includes government secrets, evidence of corruption, and email exchanges of high-ranking public officials. There is also a great deal of personal data published. Most recently, and the reason Wikileaks has been featured so prominently in the news as of late, is the release of emails sent to or received by presidential candidate and former Secretary of State Hillary Clinton’s personal email server.</p>  <p><strong>But is What Wikileaks Doing Legal?</strong></p>  <p>There is debate over not only the legality of Wikileaks’ actions, but also whether or not it is ethical. Some view the organization as a watchdog that is doing the job the mainstream media no longer does, while others consider it and those affiliated with it traitorous and dangerous.</p>  <p>Though hacking and other actions taken by Wikileaks are normally considered illegal, Wikileaks claims it is not actually doing the hacking, but simply providing a platform for those who retrieve information to share with the public. In the past, the US Supreme Court has established the American Constitution protects the re-publication of illegally gained information, provided the publisher did not violate any laws in acquiring it.</p>  <p>Some believe Wikileaks is encouraging illegal activity, which is something for which it could be held accountable, but due to a variety of issues, including the international nature of the organization, there have been few legal challenges that have stuck long-term. Wikileaks has servers throughout Europe and its headquarters are based in Sweden, which means a number of international laws do and do not apply to the organization.</p>  <p><strong>Change Could Be Ahead for Wikileaks</strong></p>  <p>Despite legal action doing little to stop Wikileaks, third-parties that play a role in the organization are taking action. Recently, Visa followed in Mastercard and Paypal’s steps when it decided to no longer allow users to send payments to Wikileaks – something the organization relies on for its funding. The companies cited legal concerns, despite the issue being fuzzy.</p>  <p>Additionally, members of the Congress have made various attempts to limit the damage from Wikileaks, in part by proposing laws that would make the distribution of classified information illegal. The issue is highly debated among lawmakers, as many believe allowing the journalists to protect their sources is an important component in the right to freedom of the press. You can read more about shield laws in this article from <a href="http://www.politico.com/blogs/under-the-radar/2015/06/house-passes-reporters-shield-measure-again-208206" target="_blank" rel="noopener noreferrer">Politico</a>.</p>  <p>So what’s the bottom line for the average person when it comes to whistleblowing and publishing controversial information online?</p>  <p>It might be tempting, should you come into possession of information that seems scandalous or of interest to the public, to take an approach similar to Wikileaks. After all, many whistleblowers fear pushback, even though they are protected by federal whistleblower laws.</p>  <p>It’s important to remember, the line between what is legal and illegal when it comes to the internet is constantly changing. An individual lacking the money, resources, and international structure of Wikileaks is better off going through traditional channels when it comes to making controversial information public. And if you consider yourself a whistleblower, it’s best to seek legal protection, especially if you have already shared the information and been accused of committing a crime.</p>  <p>Want to learn more? <a href="/contact-us/">Contact David Lindsey</a>.</p>  ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What is Doxxing?]]></title>
                <link>https://www.mdavidlindsey.com/blog/what-is-doxxing/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/what-is-doxxing/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Tue, 06 Sep 2016 19:43:29 GMT</pubDate>
                
                    <category><![CDATA[Miscellaneous Criminal Defense]]></category>
                
                
                    <category><![CDATA[Criminal Defense Lawyer]]></category>
                
                    <category><![CDATA[Doxxing]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                <description><![CDATA[<p>Doxxing, which forms from a combination of the words dropping and documents, is used to describe the malicious act of collecting private and personal information and releasing it to the public. The information usually includes private addresses and phone numbers, as well as national identity numbers, such as a person’s social security number, and other&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <p>Doxxing, which forms from a combination of the words dropping and documents, is used to describe the malicious act of collecting private and personal information and releasing it to the public. The information usually includes private addresses and phone numbers, as well as national identity numbers, such as a person’s social security number, and other sensitive information, like photos and credit reports.</p>  <p>The term was originally used within certain internet circles, but more recently has gone mainstream and popular news publications sometimes even use the phrase to describe in-depth reporting or the exposure of an anonymous online personality.</p>  <p>The first thing that’s important to understand about doxxing is that it not necessarily illegal. This is a frightening concept considering a dox often includes the revealing of very personal details of a person’s life to the general public. Despite it not being an outright crime to “dox” someone, many consider it unethical, and depending on how the information is retrieved and distributed, there could be legal consequences.</p>  <p>High Profile Victims of Doxxing</p>  <p>The act of doxxing gets the most attention when it happens to someone already in the public eye. Obviously, the dox doesn’t reveal a person’s already-public identity, but it does reveal sensitive personal information. For instance, Michelle Obama’s social security number was posted online. Beyonce’s address was supposedly revealed by a doxxer. Other celebrities who were victims of doxxing include Mel Gibson, Donald Trump, Britney Spears, and Hillary Clinton.</p>  <p>When Doxxing is a Crime</p>  <p>One of the reasons why doxxing isn’t directly illegal is because a lot of the information revealed is already available online. Doxxers simply dig deeper than most people are willing or able to in order to find it. According to one LAPD cyber crimes detective, revealing the “personal” information of a celebrity is not illegal, except when the information is used to threaten someone, or is used to steal his or her identity or infiltrate private email accounts.</p>  <p>Experts familiar with cyber crime trends believe doxxing is fairly commonplace, especially when it involves celebrities. Finding someone’s phone number or address is easy and in some cases, the only effort needed is to pay a fee to an online provider with the information. Social security information and credit reports are a little harder to gain access to, but doing so is possible if someone knows where to look – or is able to gain access to information via the credit reporting agencies – an act that is illegal.</p>  <p>Recently, a man named Christopher Chaney was sentenced to 10 years in prison after he hacked into the email accounts of celebrities Mila Kunis and Scarlett Johansson. Chaney put together a bunch of readily available clues. He used celebrity magazines and websites to gather information including mother’s maiden names and pet names, which enabled him to sign into Google, Apple, and Yahoo email accounts with ease.</p>  <p>Chaney’s crimes occurred after he gained access, when he proceeded to leak nude photos from the private accounts of the celebs. By the time he was arrested, Chaney had managed to guess passwords for nearly 50 celebrities. He was convicted on charges of identity theft, wiretapping, and unauthorized access and damage to protected computers.</p>  <p>According to cyber crimes experts, the line between legal doxxing and criminal doxxing is actually quite clear: any information obtained cannot be used for financial gain, nor can you use the information to impersonate someone. And if you accessed the information through illegal means, you’ve committed a crime and all actions that follow are also crimes. Posting personal information, obtained legally, in and of itself is perfectly legal.</p>  <p>So what should you do if you are accused of illegal doxxing? Since doxxing activities and the lines that define what’s legal and illegal are relatively new, it’s important for you to seek the assistance of an attorney. Chances are if you believe you didn’t break any laws by revealing the identity or private information of an individual, you are right – but law enforcement can still use your actions against you. You need to take action to protect yourself and ensure you are not accused of committing a crime when you did nothing illegal – even if you stepped over the line ethically.</p>  <p>Want to learn more about doxxing or <a href="/criminal-defense/computer-crimes-defense/">other computer crimes</a>? Contact <a href="/lawyers/">Denver Criminal Defense Lawyer David Lindsey</a> for more information or to schedule a consultation to discuss accusations against you.</p>  <p> </p>  ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Computer Crime Trends]]></title>
                <link>https://www.mdavidlindsey.com/blog/computer-crime-trends/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/computer-crime-trends/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Wed, 23 Dec 2015 15:53:18 GMT</pubDate>
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                <description><![CDATA[<p>Like many things, crime and computer crime tends to occur in trends. Computer crimes trends change at lightning speed and sometimes it’s tough to keep up. What trends are popular right now in computer crimes and what can we expect to see in the coming year? Attacks on a Specific Target Attacks have increasingly become&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <p>Like many things, crime and computer crime tends to occur in trends. Computer crimes trends change at lightning speed and sometimes it’s tough to keep up. What trends are popular right now in computer crimes and what can we expect to see in the coming year?</p>  <p><strong>Attacks on a Specific Target</strong></p>  <p>Attacks have increasingly become more targeted in recent years. This means hackers choose a selected target, as opposed to using any target that is vulnerable. For instance, the government data breaches that seemed to occur so frequently in 2014 are an example of a targeted attack.</p>  <p>These attacks tend to go unnoticed longer than other types of attacks, giving hackers more time to do the most damage. The data breach that involved Home Depot exposed more than 56 million credit card numbers and was in action for at least six months before it was discovered. There were more than 700 major data breaches in the United States in 2014.</p>  <p><strong>Attacks on Payment Methods</strong></p>  <p>Changes to the way consumers pay for products are likely to continue posing a threat to their security and an opportunity for hackers. More and more hackers are targeting online payment systems and stealing payment information, as well as other personal details from online consumers. Updated credit card security that began to take effect in October will likely secure point-of-purchase credit card information better, but will do little to eliminate the risk that occurs when shopping online.</p>  <p><strong>Attacks on Life on the Internet</strong></p>  <p>As more and more things involve the Internet, security attacks are also likely to arise. For instance, many people are getting their entertainment through online venues like Netflix and Amazon. There have already been security breaches related to these companies and they are likely to continue.</p>  <p>Users of social media also need to take security concerns into consideration. Not only are “cyber stalkers” a threat, large-scale attacks on personal information are also likely to occur as more and more people make social media a part of their everyday lives.</p>  <p>Trends in computer crimes continue to expand into new areas, making it even more likely you will be a victim or be accused of committing a crime yourself. If this happens to you and something you did has caught the interest of law enforcement, you need an attorney who understands computer crimes and can help you defend your rights.<a href="/contact-us/"> Contact Denver Criminal Defense Attorney David Lindsey</a> to schedule a free consultation to discuss your situation.</p>  ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Top Five Computer Crimes and What to Do If You are Accused of Any of Them]]></title>
                <link>https://www.mdavidlindsey.com/blog/top-five-computer-crimes-and-what-to-do-if-you-are-accused-of-any-of-them/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/top-five-computer-crimes-and-what-to-do-if-you-are-accused-of-any-of-them/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Tue, 07 Apr 2015 18:51:52 GMT</pubDate>
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                    <category><![CDATA[Cyberstalking]]></category>
                
                    <category><![CDATA[Hacking]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                <description><![CDATA[<p>Computer crime is on the rise and as more people do more things online, the incidence of criminal activity is expected to continue. In addition to not falling victim to computer crimes, you also need to ensure what you are doing online is not illegal. Technology is constantly changing and it can be difficult to&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <p><a href="/contact-us/">Computer crime</a> is on the rise and as more people do more things online, the incidence of criminal activity is expected to continue. In addition to not falling victim to computer crimes, you also need to ensure what you are doing online is not illegal. Technology is constantly changing and it can be difficult to keep up with what is and is not legal.</p>  <p>What are the five most common computer crimes?</p>  <p><strong>Use of Malware</strong></p>  <p>Malware is an umbrella term for viruses, worms, and other nefarious software programs intended to separate a computer user and his or her information or money. Some of the more popular malware programs appear to be virus software alerting users to an infection and asking that they purchase a related product to remove the virus. In reality, the seemingly helpful alert message is actually the virus and when you enter your payment information into the system to purchase “protection,” you are actually supplying that information to criminals.</p>  <p>To avoid falling victim to malware, do not download software from sites you do not trust. Avoid pirated software and do not open files unless you know their source. Avoiding accusations of law breaking when it comes to malware is simple: do not send viruses to other computer users and do not attempt to gain access to anyone’s information without their permission.</p>  <p><strong>Stealing a Person’s Identity</strong></p>  <p>Millions of people each year fall victim to identity theft. Someone gains access to their personal information and uses it for his or her own benefit. Hackers have the ability to gain access to financial accounts or social security numbers and destroy a person’s life.</p>  <p>To avoid having your identity stolen, never log into financial accounts using a public computer. Never share personal information in email, instant messaging, or any type of unencrypted communication. Any time you make a purchase online, check to ensure the site is secure and never provide your credit card information to a site that is not known to be reputable.</p>  <p>Chances are good you will not be accused of identity theft unless you step over the line and intend to commit a crime. If accusations do arise, you should contact an attorney familiar with computer crimes immediately.</p>  <p>The final three most common computer crimes on the list are the type that are more likely to trigger unwarranted accusations.</p>  <p><strong>Cyberstalking</strong></p>  <p>Cyber stalking is exactly what it sounds like: using the computer to stalk someone, harass them, and gain uninvited access to their life. Stalking is a common accusation in domestic violence cases and other family legal disputes, so if you are in the midst of ending a relationship, it is better to avoid interacting with your former romantic partner online. Any interaction can be twisted to look like an unwanted advance, so the less time you spend on social media sites the better. And never, under any circumstances, attempt to gain access to a former love interest’s email or other personal information online.</p>  <p><strong>Child Pornography</strong></p>  <p>It is no secret the Internet is a hot bed for pornographic material. Much of it is perfectly legal to access, but just as much of it is illegal because it features underage participants. Exploiting children online is big business and if you are accused of viewing child pornography without realizing you are doing anything wrong, you would not be the first person. To avoid breaking the law regarding child pornography, use common sense: never click on anything suspicious and if you cannot be 100% sure what you are downloading or viewing, avoid it.</p>  <p>Spam</p>  <p>The best way to avoid breaking laws associated with spam is to never send anyone an email without that person’s permission. If you operate any sort of organization or business online, make sure you offer an opt-in and opt-out feature for email and keep careful records of recipient requests. If you are accused of spamming, put your current email methods on hold and contact an attorney.</p>  <p>If you would like to learn more about these and other computer crimes, check out the <a href="http://www.fbi.gov/about-us/investigate/cyber/cyber" target="_blank" rel="noopener noreferrer">FBI’s cybercrimes website</a>.</p>  <p>Worried you might be accused of a computer crime? Think someone is trying to trick you into breaking the law online? You need legal support. David Lindsey can help. Contact him to schedule a consultation to discuss your case.</p>  <p> </p>  ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What is Cyber stalking?]]></title>
                <link>https://www.mdavidlindsey.com/blog/what-is-cyber-stalking/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/what-is-cyber-stalking/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Tue, 10 Feb 2015 16:15:25 GMT</pubDate>
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                    <category><![CDATA[Cyberstalking]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                    <category><![CDATA[Stalking]]></category>
                
                
                
                <description><![CDATA[<p>What is Cyber stalking? Most people think of stalking as something that involves in-person scenarios. An ex-boyfriend or girlfriend might follow you to work or show up at your home uninvited. A stranger struggling with mental health issues could see you in public and become obsessed with you. These are all frightening scenarios that describe&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <p>What is Cyber stalking?</p>  <p>Most people think of stalking as something that involves in-person scenarios. An ex-boyfriend or girlfriend might follow you to work or show up at your home uninvited. A stranger struggling with mental health issues could see you in public and become obsessed with you. These are all frightening scenarios that describe stalking, but there is another place in which stalking can occur and be just as invasive: the Internet.</p>  <p><strong>Cyber Stalking vs. Identity Theft</strong></p>  <p>Online stalking can have a romantic bent, but its goal is generally to destroy the life of the victim. Any attack on a single person in an effort to exact control or revenge is considered cyber stalking. It can include harassment or humiliation of the victim or the victim’s loved ones, theft, threat of harm, or a combination of all three.</p>  <p>Sometimes cyber stalking is a component of traditional stalking. For instance, a former significant other might harass you online as well as in person. However, most cases of cyber stalking allow the perpetrator to remain somewhat anonymous. There are many instances in which cyber stalking victims never learn the real-life identify of their stalkers.</p>  <p>Cyber stalking differs from identify theft because the goal of identify theft is strictly financial gain. Though there are instances in which a cyber stalker steals from his or her victim, the goal is to destroy the victim’s life. They have a single target, whereas most criminals who commit identity theft care little about the individual victims, of which there are many.</p>  <p>Are you concerned you are at risk of being a victim of cyber stalking? <a href="http://womensissues.about.com/od/violenceagainstwomen/a/CyberPrevention.htm" target="_blank" rel="noopener noreferrer">These tips</a> can protect you online.</p>  <p>The personal aspect of cyber stalking means it can be easier for a person to be accused of this crime than identity theft. Whether or not you steal money from someone using the Internet is fairly cut and dry. There is unlikely to be an instance in which you enjoy financial gain illegally without intending to teal from someone online.</p>  <p>Cyber stalking is a different matter. It is possible to cause someone to feel threatened without intending to do so. This line is often crossed when it comes to the end of a romantic relationship. What you view as an attempt to regain your significant other’s affection could be interpreted as a threat.</p>  <p><strong>Accused of Cyber Stalking?</strong></p>  <p>How do you avoid being accused of cyber stalking and what should you do if you are accused?</p>  <p>First, if you are in the midst of ending a relationship and things are tumultuous, avoid interacting online. End social media interactions and consider severing links completely. If you must interact, make sure discussions are factual in nature. For instance, emailing an ex to let him or her know you want your DVD collection mailed to your new address is fine. Including a threat to harm your ex if he or she does not do so could get you into legal trouble. Assume that any interaction you have with someone online will be made public if it is not already and act accordingly. If saying something could later paint you in a negative light to law enforcement, do not say or write it.</p>  <p>Have you been accused of cyber stalking? Are you concerned interacting with someone online could get you into legal trouble? I can help. <a href="/contact-us/">Contact David Lindsey</a>, Denver criminal law attorney.</p>  ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[What is the Difference Between Hacking and Phishing?]]></title>
                <link>https://www.mdavidlindsey.com/blog/what-is-the-difference-between-hacking-and-phishing/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/what-is-the-difference-between-hacking-and-phishing/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Mon, 04 Aug 2014 21:21:54 GMT</pubDate>
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                    <category><![CDATA[Hacking]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                    <category><![CDATA[Phishing]]></category>
                
                
                
                <description><![CDATA[<p>Hacking and phishing are likely two terms you are familiar with, but unless you have been a victim or you work in an industry related to computer security you might not understand the difference between the two. Both crimes are typically committed by nefarious individuals intending to defraud someone out of money. However, in some&hellip;</p>
]]></description>
                <content:encoded><![CDATA[ <p>Hacking and phishing are likely two terms you are familiar with, but unless you have been a victim or you work in an industry related to computer security you might not understand the difference between the two.</p>  <p>Both crimes are typically committed by nefarious individuals intending to defraud someone out of money. However, in some cases, innocent actions can be misconstrued as an attempt to commit a computer crime. This is especially true when a person’s job requires them to perform certain actions related to computer security, information gathering, or interacting with people via email or social media. Understanding hacking and phishing, and knowing the difference between the two, can help you protect yourself from becoming a victim of criminals. It can also help you protect your freedom if you are accused of a crime.</p>  <p><strong>Phishing</strong></p>  <p>Phishing is an illegal means by which to acquire the information consumers use to identify themselves online. For instance, many phishing scams target usernames and passwords to sites that store credit card or bank information. An example would be when a criminal sends an email to a consumer that claims to be correspondence from his or her bank. The email includes a link that appears to be the bank’s website. The victim clicks the link and enters his or her sign-in information. However, the link was actually to a look-alike site that is designed solely for the purpose of collecting information illegally.</p>  <p><strong>Computer Hacking</strong></p>  <p>Hacking, in its simplest terms, is the act of gaining access to information to which you are not authorized. Hacking might have a similar intent to phishing, to defraud consumers in some way, but the means of doing so is different. Hacking can also be done for other purposes and is considered by the United States government a matter of national security. The FBI considers hacking part of its Computer Intrusions category of crimes, which also includes malware, spyware, viruses, worms, and bots.</p>  <p>Some consider phishing a form of hacking, but in hacking, the information is extracted involuntarily. The criminal is forced to take over a system, as opposed to baiting the victim into participating, as would be the case in phishing.</p>  <p><strong>Protecting Yourself</strong></p>  <p>Both hacking and phishing are on the rise and continue to increase in complexity. People who consider themselves smart enough to recognize an unusual email or fraudulent website have fallen victim to some of the more elaborate perpetrators. Likewise, hacking crimes have become more elaborate, as evidenced by the recent successful attempts to access credit card information of consumers shopping at Target and other retailers.</p>  <p>What does this mean for you? First, you need to protect yourself from the criminals and know how to recognize suspicious activity. Second, if you have a job that requires you access computer information, you need to know your limitations. There are instances in which people work as so-called ethical hackers and are responsible for finding weaknesses in the computer systems of their clients. If this is you, make sure you understand the parameters of each assignment and that you have extensive written details of the project.</p>  <p>Finally, if you consider yourself an “amateur hacker” and you just like to fool around occasionally without ever intending to steal or cheat, you can still get into a great deal of trouble. Gaining access to computer systems to which you are not authorized, even if you have no intentions of taking anyone’s money, is still a crime.</p>  <p>If you cross a line unintentionally or otherwise, I can help. I am an attorney that understands the complexities of computer crime laws and I know how easy it is to find yourself in trouble when you never intended to break the law. To learn more about <a href="/criminal-defense/computer-crimes-defense/">computer crimes defense in Collorado and Wyoming</a> , contact criminal law defense attorney David Lindsey, in Denver to <a href="/contact-us/">schedule a free consultation</a> to discuss the specifics of your situation.</p>  ]]></content:encoded>
            </item>
        
            <item>
                <title><![CDATA[Have You Been Accused of a Computer Crime?]]></title>
                <link>https://www.mdavidlindsey.com/blog/have-you-been-accused-of-a-computer-crime/</link>
                <guid isPermaLink="true">https://www.mdavidlindsey.com/blog/have-you-been-accused-of-a-computer-crime/</guid>
                <dc:creator><![CDATA[David Lindsey, Attorney at Law]]></dc:creator>
                <pubDate>Tue, 08 Apr 2014 21:03:56 GMT</pubDate>
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                
                    <category><![CDATA[Computer Crimes]]></category>
                
                    <category><![CDATA[Hacking]]></category>
                
                    <category><![CDATA[Identity Theft]]></category>
                
                    <category><![CDATA[Internet Crimes]]></category>
                
                
                
                <description><![CDATA[<p>An accusation of a computer crime might not seem as serious as that of a violent crime or various other charges, but computer crimes are very serious. In most cases, committing a computer crime is a violation of federal law and for some could even violate international law. If you are suspected of a computer&hellip;</p>
]]></description>
                <content:encoded><![CDATA[
<p>An accusation of a <a href="/criminal-defense/computer-crimes-defense/">computer crime</a> might not seem as serious as that of a violent crime or various other charges, but computer crimes are very serious. In most cases, committing a computer crime is a violation of federal law and for some could even violate international law.</p>



<p>If you are suspected of a computer crime, you will be exposed to rigorous and intrusive investigation by various law enforcement agencies, including the FBI. If convicted, you could face prison time, steep fines, and long-term penalties that affect your employment. An accusation of a computer crime, <a href="/criminal-defense/computer-crimes-defense/denver-computer-hacking-defense-lawyer/">hacking</a>, or any type of criminal activity on the Internet MUST be taken serious.</p>



<p><strong>What Constitutes a Computer Crime?</strong></p>



<p>Computer crimes come in all shapes and sizes. In some cases, crimes committed using a computer or online could result in multiple charges. Computer crimes include:</p>



<ul class="wp-block-list">
<li><a href="/criminal-defense/fraud-crimes-defense/">Fraud </a></li>



<li> <a href="/criminal-defense/business-identity-theft/denver-identity-theft-attorney/">Identity theft using a computer</a></li>



<li> Denial-of-service attacks</li>



<li>Some instances of spamming</li>



<li>Deliberate circumvention of security systems</li>



<li>Unauthorized access to or modification of programs (hacking)</li>



<li>Intellectual property theft, including software piracy</li>



<li>Industrial espionage through access to or theft of computer materials</li>



<li>Creating or spreading viruses or worms</li>



<li>Salami slicing (stealing money repeatedly in extremely small quantities via computer)</li>



<li>Making and digitally distributing child pornography</li>
</ul>



<p><strong>Accidental Crimes</strong></p>



<p>Unfortunately, there are instances in which individuals are accused of computer crimes that were unknowingly committed. Criminal computer activity is extremely complex and a person can break the law without even realizing it. This is especially common for those working in the data industry. A simple push of the wrong button could result in actions that appear to be criminal.</p>



<p>The Internet has expanded our reach throughout the world and it is easier than ever before to communicate with people at the drop of a hat. Despite the benefits, this opportunity has created a great deal of risk, too. Every time you open an email attachment or strike up a discussion, you are at risk. Often, computer crime charges result from misunderstanding or ignorance. If your actions have led to accusations of criminal behavior, you need the assistance of a computer crimes attorney.</p>



<p>Proving a law has been broken unintentionally is an important part of a solid defense strategy. If you have been accused of a computer crime, but had no intention of breaking the law, you need the support of an attorney that understands the complexities of computer crime laws. Contact David Lindsey, Denver criminal law attorney to <a href="/contact-us/">schedule a free consultation</a> to discuss the specifics of your situation.</p>
]]></content:encoded>
            </item>
        
    </channel>
</rss>