Computer Crimes

Any crime that is committed using a computer can be labeled a computer crime. Even though crimes like computer fraud and online solicitation are similar to their offline counterparts, the use of a computer means that the State and Federal laws governing how these crimes are investigated and prosecuted are different. The questions of jurisdiction, rules for the collection and processing of evidence, and other rules can be completely different.

Criminal defense attorney John. R. Teakell can help.

If you are facing investigation or have been charged with an internet or computer crime, it’s time to be proactive about your case. Attorney John R. Teakell understands the technical application of the law. He spent over 12 years in the U.S. Attorney’s Office as a federal prosecutor for the Northern District of Texas. Put that extensive experience to work for you.

He knows the right questions to ask.

Proving your innocence sometimes comes down to knowing which questions to ask. For example, were you trying to commit a crime? Were you aware that what you were doing was a crime? Were you the only one with access to the computer that was used? Does the action you are accused of having committed warrant a formal charge?

He has the right connections to help you.

Attorney John Teakell’s years in the Attorney’s Office didn’t just give him inside knowledge of how the prosecution works, it provided him valuable contacts and connections that he will put to work on your behalf. These contacts include former federal agents and computer experts who can identify gaps in the prosecution’s evidence and bridge them to establish your innocence or reduce your liability.

The initial consultation is free.

Getting the help you need requires you to take immediate action. It costs you nothing to call John Teakell today and arrange a free consultation, but not calling could cost you your freedom.

The Price of Inaction

The State of Texas prosecutes most computer crimes under Title 7, Chapter 33 of the Texas State Penal Code. These offenses cover everything from breach of computer security and online impersonation to online solicitation of a minor or outright computer fraud. If found guilty, penalties can include up to 99 years in state prison.

The Federal Government prosecutes most computer crimes under The Computer Fraud and Abuse Act (CFAA) of 1986, updated in 2002 by the Patriot Act and the 2008 Identity Theft and Restitution Act. While the minimum prison sentence under Federal law is 10 years, the term can be life imprisonment if a death occurred due to the crime.

Don’t gamble with your future. Call Today.

  • COMPUTER FRAUD
    Computer fraud is just one of many illegal activities and violations that make up internet crime. It is one of the fastest growing segments of criminal prosecution and because of that, both state and federal authorities are coming down hard on anyone suspected or caught engaging in computer fraud.

    The Computer Fraud and Abuse Act (CFAA)

    This is the law that covers most kinds of computer crimes, including computer fraud. This law decides whether the law is covered in criminal court or is merely a civil violation. It is a law that has grown over time, with additions to it arising from the Patriot Act in 2002 and the 2008 Identity Theft and Restitution Act, and is now complex enough that it takes an experienced attorney to understand the law well enough to be able to defend someone facing an investigation.

    Typical Fraud Violations

    • Accessing a protected computer without authorization with intent to defraud
    • Exceeding authorized access and furthering the fraud and obtaining anything of value
    • Violation of “knowingly and with intent to defraud trafficking in any password.”


  • INTERNET CRIMES
    Internet crime is a broad category that can range from child pornography distribution to investment fraud as well as illegal access to data and beyond. Falling under the complex and ever-growing laws outlined in the Computer Fraud and Abuse Act (CFAA), both state and federal law enforcement officers are cracking down even harder on internet crimes than their offline counterparts due to the growing number of people being impacted by them.

    Internet Crime Violations

    These are just a few of the more common internet crime violations that can result in prison sentences:

    • Accessing a protected computer without authorization with intent to defraud
    • Exceeding authorized access and furthering the fraud and obtaining anything of value
    • Violation of “knowingly and with intent to defraud trafficking in any password.”

    Imagine If…

    • You hop on a co-worker’s computer while they are away from their desk and send out a prank email in their name. You are arrested for internet crimes and charged with computer fraud.
    • You use your login credentials to get into the hospital’s database and look up information on the room number and status of a friend’s relative that isn’t under your care so that you can let them know where to find their loved one. You are charged with internet crimes and computer fraud.

    It doesn’t take much for the average person to end up being charged with computer fraud. A poorly thought-out decision or a simple act of compassion can be enough.

    Let John R. Teakell Help Protect You

    Experienced criminal defense attorney John R. Teakell knows the legal system. He knows the prosecutors and he knows the right questions to ask to get you the help you need. He has the skill and the industry experience to protect your rights and your freedom.


  • Computers and Miscellaneous Violations:
    This category of computer crimes is designed to handle attacks on protected computers, such as those operated by government offices, financial institutions, and private computers that affect communication between people in different states or in different countries. For example, it covers attacks on computers used by internet service providers such as Frontier Communications or Verizon Wireless.

    Protected Access

    The amount of information that falls under protected access laws includes:

    • National defense or foreign relations data
    • Financial records
    • Credit reporting agency records and data
    • U.S department or agency data
    • Data from any nonpublic computer of any U.S. department or agency
    • Transmission of a program, data, or code
    • Transmission of a malicious code
    • Extortion of money or other value by threat to cause damage to a protected computer

    Let criminal defense attorney John R. Teakell help.

    If you’re facing protected access violations or any of the illegal activities that fall under the miscellaneous sections of the computer crimes laws, call today. You don’t want to give the state or the federal government a head start on investigating your case.


  • Broad Scope Access Violations: The Broad Scope Access Violations in the CFAA are defined in the following way

    • Intentionally accessing a computer without authorization and as a result recklessly causes damage
    • Violation for “intentionally accessing a protected computer without authorization” and as a result intentionally causing damage
    • Unauthorized access or exceeding authorization to a computer